Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. TCP connect() scan






2. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).






3. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.






4. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a






5. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc






6. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public






7. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.






8. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.






9. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can






10. The transmission of digital signals without precise clocking or synchronization.






11. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra






12. RPC Scan






13. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).






14. Nmap normal output






15. Looking over an authorized user's shoulder in order to steal information (such as authentication information).






16. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -






17. A social-engineering attack using computer resources - such as e-mail or IRC.






18. ex 02






19. Hex 12






20. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col






21. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.






22. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.






23. Access by information systems (or users) communicating from outside the information system security perimeter.






24. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.






25. Normal scan timing






26. Phases of an attack






27. Name given to expert groups that handle computer security incidents.






28. A virus that plants itself in a system's boot sector and infects the master boot record.






29. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.






30. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.






31. A documented process for a procedure designed to be consistent - repeatable - and accountable.






32. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption






33. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.






34. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.






35. A software or hardware application or device that captures user keystrokes.






36. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.






37. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.






38. A routing protocol developed to be used within a single organization.






39. A computer network confined to a relatively small area - such as a single building or campus.






40. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with






41. A program designed to execute at a specific time to release malicious code onto the computer system or network.






42. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.






43. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.






44. A record showing which user has accessed a given resource and what operations the user performed during a given period.






45. Transmitting one protocol encapsulated inside another protocol.






46. Hex 10






47. NSA






48. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.






49. A configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just frames addressed to it






50. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr