Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.






2. Polymorphic Virus






3. An Application layer protocol for sending electronic mail between servers.






4. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all






5. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.






6. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).






7. A section or subset of the network. Often a router or other routing device provides the end point of the segment.






8. An adapter that provides the physical connection to send and receive data between the computer and the network media.






9. ICMP Type/Code 11






10. Vulnerability Scanning






11. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.






12. Port 22






13. Port 80/81/8080






14. Incremental Substitution






15. An evaluation conducted to determine the potential for damage to or loss of an IT asset.






16. A structured set of criteria for evaluating computer security within products and systems produced by European countries; it has been largely replaced by the Common Criteria.






17. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra






18. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.






19. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.






20. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.






21. Port 31337






22. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.






23. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.






24. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






25. nmap






26. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.






27. A host designed to collect data on suspicious activity.






28. The process of recording activity on a system for monitoring and later review.






29. 18 U.S.C. 1029






30. FIN Scan






31. The act or actions of a hacker to put forward a cause or a political agenda - to affect some societal change - or to shed light on something he feels to be political injustice. These activities are usually illegal in nature.






32. Ports 20/21






33. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.






34. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.






35. Xmas Tree scan






36. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.






37. The potential for damage to or loss of an IT asset






38. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio






39. The process of systematically testing each port on a firewall to map rules and determine accessible ports.






40. A computer virus that infects and spreads in multiple ways.






41. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets






42. Nmap grepable output






43. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.






44. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.






45. A software or hardware defect that often results in system vulnerabilities.






46. Window Scan






47. Using conversation or some other interaction between people to gather useful information.






48. List Scan






49. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the






50. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.