Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attack that combines a brute-force attack with a dictionary attack.






2. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






3. Normal scan timing






4. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.






5. Hex 12






6. A list of IP addresses and corresponding MAC addresses stored on a local computer.






7. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).






8. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.






9. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.






10. Recording the time - normally in a log file - when an event happens or when information is created or modified.






11. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.






12. Port 135






13. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.






14. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action






15. A portion of memory used to temporarily store output or input data.






16. The lack of clocking (imposed time ordering) on a bit stream.






17. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.






18. Two or more LANs connected by a high-speed line across a large geographical area.






19. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio






20. An organized collection of data.






21. A record showing which user has accessed a given resource and what operations the user performed during a given period.






22. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory






23. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.






24. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o






25. PI and PT Ping






26. A file system used by the Mac OS.






27. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.






28. Black box test






29. Computer software or hardware that can intercept and log traffic passing over a digital network.






30. Independent review and examination of records and activities to assess the adequacy of system controls - to ensure compliance with established policies and operational procedures - and to recommend necessary changes.






31. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.






32. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.






33. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption






34. A computer file system architecture used in Windows - OS/2 - and most memory cards.






35. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks






36. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.






37. A documented process for a procedure designed to be consistent - repeatable - and accountable.






38. Directory Transversal






39. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.






40. White hat






41. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman






42. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.






43. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).






44. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all






45. A command used in HTTP and FTP to retrieve a file from a server.






46. Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or eight-digit hexadecimal number.






47. A Canonical Name record within DNS - used to provide an alias for a domain name.






48. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely






49. Insane scan timing






50. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.