Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.






2. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo






3. A computer network confined to a relatively small area - such as a single building or campus.






4. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi






5. Port 88






6. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.






7. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.






8. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).






9. Vulnerability Scanning






10. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.






11. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely






12. A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.






13. A protocol used to pass control and error messages between nodes on the Internet.






14. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.






15. A group of experts that handles computer security incidents.






16. IP Protocol Scan






17. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.






18. ICMP Netmask






19. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.






20. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.






21. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use






22. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).






23. Metamorphic Virus






24. Xmas Tree scan






25. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.






26. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.






27. don't ping






28. Hex 04






29. Injecting traffic into the network to identify the operating system of a device.






30. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.






31. ICMP Type/Code 8






32. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.






33. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity






34. nmap






35. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.






36. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door






37. A list of IP addresses and corresponding MAC addresses stored on a local computer.






38. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.






39. Hex 10






40. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio






41. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.






42. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory






43. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.






44. A virus that plants itself in a system's boot sector and infects the master boot record.






45. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.






46. Sneaky scan timing






47. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.






48. 18 U.S.C. 1029






49. Monitoring of telephone or Internet conversations - typically by covert means.






50. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.