Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A software or hardware application or device that captures user keystrokes.






2. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.






3. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).






4. ex 02






5. Phases of an attack






6. An Application layer protocol for managing devices on an IP network.






7. Port 389






8. The last portion of the SID that identifies the user to the system in Windows. A RID of 500 identifies the administrator account.






9. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.






10. A string that represents the location of a web resource






11. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.






12. The concept of having more than one person required to complete a task






13. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.






14. Security identifier. The method by which Windows identifies user - group - and computer accounts for rights and permissions.






15. MAC Flooding






16. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.






17. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.






18. An agreement between the penetration tester and the client detailing the activities the tester is permitted to perform.






19. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.






20. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the






21. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.






22. The process of systematically testing each port on a firewall to map rules and determine accessible ports.






23. Network Scanning






24. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.






25. The act of dialing all numbers within an organization to discover open modems.






26. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.






27. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.






28. A list of IP addresses and corresponding MAC addresses stored on a local computer.






29. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o






30. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






31. Another term for firewalking






32. The exploitation of a security vulnerability






33. Nmap normal output






34. An attack that exploits the common mistake many people make when installing operating systems






35. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.






36. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.






37. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.






38. A routing protocol developed to be used within a single organization.






39. Port 22






40. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door






41. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.






42. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.






43. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.






44. TCP connect() scan






45. The software product or system that is the subject of an evaluation.






46. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.






47. A storage buffer that transparently stores data so future requests for the same data can be served faster.






48. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.






49. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.






50. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.