Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An evaluation conducted to determine the potential for damage to or loss of an IT asset.






2. Computer software or hardware that can intercept and log traffic passing over a digital network.






3. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi






4. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)






5. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.






6. An anonymous connection to an administrative share (IPC$) on a Windows machine. Null sessions allow for enumeration of Windows machines - among other attacks.






7. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)






8. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.






9. Hex 12






10. Hex 04






11. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.






12. A routing protocol developed to be used within a single organization.






13. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use






14. The act of checking some sequence of tokens for the presence of the constituents of some pattern.






15. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.






16. A point of reference used to mark an initial state in order to manage change.






17. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.






18. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.






19. A software or hardware defect that often results in system vulnerabilities.






20. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public






21. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action






22. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.






23. Controls to detect anomalies or undesirable events occurring on a system.






24. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.






25. A social-engineering attack using computer resources - such as e-mail or IRC.






26. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.






27. In regard to hash algorithms - this occurs when two or more distinct inputs produce the same output.






28. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.






29. A communications protocol used for browsing the Internet.






30. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -






31. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa






32. Any item of value or worth to an organization - whether physical or virtual.






33. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.






34. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.






35. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr






36. 18 U.S.C. 1029






37. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.






38. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.






39. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are






40. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the






41. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.






42. A social-engineering attack that manipulates the victim into calling the attacker for help.






43. White box test






44. A defined measure of service within a network system






45. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.






46. Port 80/81/8080






47. A free and popular version of the Unix operating system.






48. A group of people - gathered together by a business entity - working to address a specific problem or goal.






49. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.






50. ICMP Type/Code 0-0