Test your basic knowledge |

CEH: Certified Ethical Hacker

  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A Windows-based GUI version of nmap.

2. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.

3. The ability to trace actions performed on a system to a specific user or system entity.

4. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive

5. Describes practices in production and development that promote access to the end product's source materials.

6. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.

7. A method of external testing whereby several systems or resources are used together to effect an attack.

8. The default network authentication suite of protocols for Windows NT 4.0

9. A group of people - gathered together by a business entity - working to address a specific problem or goal.

10. A social-engineering attack that manipulates the victim into calling the attacker for help.

11. Part of a service contract where the level of service is formally defined; may be required as part of the initial pen test agreements.

12. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.

13. ICMP Timestamp

14. The steps taken to gather evidence and information on the targets you wish to attack.

15. An attack that exploits the common mistake many people make when installing operating systems

16. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.

17. Controls to detect anomalies or undesirable events occurring on a system.

18. A list of IP addresses and corresponding MAC addresses stored on a local computer.

19. Polite scan timing

20. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.

21. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.

22. A type of malware that covertly collects information about a user.

23. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.

24. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).

25. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP

26. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.

27. Vulnerability Scanning

28. Black box test

29. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.

30. Port 88

31. A group of experts that handles computer security incidents.

32. Phases of an attack

33. An agreement between the penetration tester and the client detailing the activities the tester is permitted to perform.

34. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.

35. The Security Accounts Manager file in Windows stores all the password hashes for the system.

36. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.

37. Evaluation in which testers attempt to penetrate the network.

38. The process of embedding information into a digital signal in a way that makes it difficult to remove.

39. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.

40. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.

41. Directing a protocol from one port to another.

42. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.

43. Policy stating what users of a system can and cannot do with the organization's assets.

44. ACK Scan

45. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.

46. The process of determining if a network entity (user or service) is legitimate

47. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio

48. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.

49. A person or entity indirectly involved in a relationship between two principles.

50. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption