Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.






2. The default network authentication suite of protocols for Windows NT 4.0






3. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.






4. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.






5. The steps taken to gather evidence and information on the targets you wish to attack.






6. A protocol defining packets that are able to be routed by a router.






7. 18 U.S.C. 1029






8. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator






9. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi






10. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.






11. White hat






12. A computer file system architecture used in Windows - OS/2 - and most memory cards.






13. Ping Scan






14. Nmap normal output






15. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).






16. FTP Bounce Attack






17. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc






18. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.






19. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.






20. Any network incident that prompts some kind of log entry or other notification.






21. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.






22. Aggressive scan timing






23. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)






24. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.






25. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.






26. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the






27. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






28. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.






29. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are






30. A device providing temporary - on-demand - point-to-point network access to users.






31. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






32. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.






33. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.






34. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.






35. Transmitting one protocol encapsulated inside another protocol.






36. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.






37. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi






38. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.






39. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.






40. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.






41. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.






42. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.






43. ICMP Timestamp






44. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par






45. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.






46. nmap






47. A portion of memory used to temporarily store output or input data.






48. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all






49. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.






50. An Application layer protocol for sending electronic mail between servers.