Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The potential for damage to or loss of an IT asset






2. Port 389






3. Describes practices in production and development that promote access to the end product's source materials.






4. Port 22






5. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely






6. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.






7. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.






8. Idlescan






9. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.






10. Hashing algorithm that results in a 128-bit output.






11. ICMP Type/Code 11






12. The transmission of digital signals without precise clocking or synchronization.






13. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.






14. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.






15. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.






16. A software or hardware application or device that captures user keystrokes.






17. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.






18. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.






19. An Internet routing protocol used to exchange routing information within an autonomous system.






20. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.






21. Hex 04






22. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.






23. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.






24. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.






25. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.






26. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.






27. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.






28. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.






29. ICMP Type/Code 8






30. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.






31. ICMP Netmask






32. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.






33. Xmas Tree scan






34. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.






35. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr






36. In computer security - this is an algorithm that uses separate keys for encryption and decryption.






37. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.






38. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the






39. A series of documents and notes on standards used or proposed for use on the Internet; each is identified by a number.






40. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.






41. An adapter that provides the physical connection to send and receive data between the computer and the network media.






42. ICMP Type/Code 3-13






43. A computer process that requests a service from another computer and accepts the server's responses.






44. A type of malware that covertly collects information about a user.






45. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.






46. Port 88






47. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a






48. A protocol for exchanging packets over a serial line.






49. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






50. A file system used by the Mac OS.