Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.






2. Transmitting one protocol encapsulated inside another protocol.






3. Network Scanning






4. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.






5. A documented process for a procedure designed to be consistent - repeatable - and accountable.






6. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.






7. Xmas Tree scan






8. ICMP Netmask






9. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.






10. The ability to trace actions performed on a system to a specific user or system entity.






11. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.






12. The level of importance assigned to an IT asset






13. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.






14. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.






15. Sneaky scan timing






16. Polymorphic Virus






17. An informed decision to accept the potential for damage to or loss of an IT asset.






18. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






19. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.






20. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator






21. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.






22. A Canonical Name record within DNS - used to provide an alias for a domain name.






23. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.






24. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.






25. A document describing information security guidelines - policies - procedures - and standards.






26. IP Protocol Scan






27. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.






28. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.






29. A program designed to execute at a specific time to release malicious code onto the computer system or network.






30. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.






31. An attack in which a hacker steps between two ends of an already-established communication session and uses specialized tools to guess sequence numbers to take over the channel.






32. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is






33. ACK Scan






34. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private






35. UDP Scan






36. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).






37. A command that instructs the system processor to do nothing. Many overflow attacks involve stringing several NOP operations together (known as a NOP sled).






38. Used for exchanging structured information - such as XML-based messages - in the implementation of web services






39. A data encryption/decryption program often used for e-mail and file storage.






40. A defined measure of service within a network system






41. FIN Scan






42. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).






43. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.






44. Policy stating what users of a system can and cannot do with the organization's assets.






45. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.






46. 18 U.S.C. 1029






47. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP






48. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)






49. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.






50. 18 U.S.C. 1030