Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.






2. ACK Scan






3. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.






4. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.






5. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.






6. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door






7. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption






8. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.






9. Cracking Tools






10. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.






11. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.






12. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.






13. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.






14. A method of external testing whereby several systems or resources are used together to effect an attack.






15. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.






16. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)






17. nmap all output






18. The process of recording activity on a system for monitoring and later review.






19. ICMP Ping






20. NSA






21. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.






22. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all






23. ICMP Timestamp






24. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






25. Incremental Substitution






26. The act of dialing all numbers within an organization to discover open modems.






27. A backlog of packets stored in buffers and waiting to be forwarded over an interface.






28. A host designed to collect data on suspicious activity.






29. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g






30. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.






31. Hex 12






32. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.






33. Paranoid scan timing






34. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






35. A computer file system architecture used in Windows - OS/2 - and most memory cards.






36. The default network authentication suite of protocols for Windows NT 4.0






37. A protocol used to pass control and error messages between nodes on the Internet.






38. A computer network confined to a relatively small area - such as a single building or campus.






39. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.






40. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.






41. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.






42. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.






43. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.






44. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.






45. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.






46. Controls to detect anomalies or undesirable events occurring on a system.






47. Port 135






48. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.






49. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.






50. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.