Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.






2. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi






3. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi






4. NSA






5. Process of breaking a packet into smaller units when it is being transmitted over a network medium that's unable to support a transmission unit the original size of the packet.






6. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.






7. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.






8. Directory Transversal






9. An organized collection of data.






10. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.






11. A device providing temporary - on-demand - point-to-point network access to users.






12. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.






13. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.






14. The software product or system that is the subject of an evaluation.






15. Establish Null Session






16. An attack that combines a brute-force attack with a dictionary attack.






17. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.






18. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.






19. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.






20. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are






21. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.






22. ICMP Ping






23. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response






24. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.






25. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.






26. ICMP Type/Code 11






27. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can






28. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






29. A communications path - such as the Internet - authorized for data transmission within a computer system or network.






30. A configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just frames addressed to it






31. A Windows-based GUI version of nmap.






32. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.






33. A free and popular version of the Unix operating system.






34. Formal description and evaluation of the vulnerabilities in an information system






35. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.






36. A protocol that allows a client computer to request services from a server and the server to return the results.






37. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o






38. Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.






39. Normal scan timing






40. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.






41. The exploitation of a security vulnerability






42. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity






43. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.






44. Idlescan






45. An informed decision to accept the potential for damage to or loss of an IT asset.






46. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.






47. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss






48. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).






49. The condition of a resource being ready for use and accessible by authorized users.






50. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.