Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Describes practices in production and development that promote access to the end product's source materials.






2. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door






3. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.






4. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.






5. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.






6. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory






7. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.






8. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.






9. A defined measure of service within a network system






10. Sneaky scan timing






11. ICMP Type/Code 3






12. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.






13. ICMP Timestamp






14. Access by information systems (or users) communicating from outside the information system security perimeter.






15. A person or entity indirectly involved in a relationship between two principles.






16. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.






17. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.






18. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.






19. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.






20. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the






21. A protocol defining packets that are able to be routed by a router.






22. Metamorphic Virus






23. nmap all output






24. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.






25. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie






26. Software code - a portion of data - or sequence of commands intended to take advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware.






27. The exploitation of a security vulnerability






28. Port 161/162






29. A list of IP addresses and corresponding MAC addresses stored on a local computer.






30. CAN-SPAM






31. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U






32. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.






33. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.






34. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.






35. The act or actions of a hacker to put forward a cause or a political agenda - to affect some societal change - or to shed light on something he feels to be political injustice. These activities are usually illegal in nature.






36. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.






37. A string that represents the location of a web resource






38. The conveying of official access or legal power to a person or entity.






39. A group of people - gathered together by a business entity - working to address a specific problem or goal.






40. A software or hardware application or device that captures user keystrokes.






41. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).






42. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.






43. Aggressive scan timing






44. A principle in security engineering that attempts to use anonymity and secrecy (of design - implementation - and so on) to provide security; the footprint of the organization - entity - network - or system is kept as small as possible to avoid intere






45. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is






46. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action






47. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.






48. Occurs when authorized users accumulate excess privileges on a system due to moving from position to position.






49. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g






50. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.