Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Phases of an attack






2. A record showing which user has accessed a given resource and what operations the user performed during a given period.






3. MAC Flooding






4. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a






5. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main






6. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action






7. ACK Scan






8. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.






9. NSA






10. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.






11. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.






12. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).






13. Another term for firewalking






14. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.






15. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.






16. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.






17. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.






18. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.






19. A routing protocol developed to be used within a single organization.






20. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.






21. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).






22. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi






23. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).






24. ICMP Timestamp






25. Ping Scan






26. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.






27. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.






28. Xmas Tree scan






29. nmap






30. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu






31. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.






32. The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information






33. Microsoft SID 500






34. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are






35. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.






36. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.






37. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.






38. White box test






39. An evaluation conducted to determine the potential for damage to or loss of an IT asset.






40. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.






41. FTP Bounce Attack






42. Aggressive scan timing






43. Version Detection Scan






44. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.






45. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.






46. Controls to detect anomalies or undesirable events occurring on a system.






47. A documented process for a procedure designed to be consistent - repeatable - and accountable.






48. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.






49. The art and science of creating a covert message or image within another message - image - audio - or video file.






50. The default network authentication suite of protocols for Windows NT 4.0