Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.






2. ICMP Type/Code 8






3. A wireless networking mode where all clients connect to the wireless network through a central access point.






4. An evaluation conducted to determine the potential for damage to or loss of an IT asset.






5. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.






6. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.






7. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o






8. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






9. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.






10. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.






11. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio






12. A documented process for a procedure designed to be consistent - repeatable - and accountable.






13. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely






14. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use






15. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.






16. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U






17. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.






18. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.






19. Using conversation or some other interaction between people to gather useful information.






20. A communications protocol used for browsing the Internet.






21. An adapter that provides the physical connection to send and receive data between the computer and the network media.






22. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.






23. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.






24. Black box test






25. Process of breaking a packet into smaller units when it is being transmitted over a network medium that's unable to support a transmission unit the original size of the packet.






26. A business - government agency - or educational institution that provides access to the Internet.






27. Access by information systems (or users) communicating from outside the information system security perimeter.






28. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.






29. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.






30. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.






31. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.






32. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.






33. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.






34. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.






35. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.






36. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.






37. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.






38. SYN Ping






39. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.






40. A person or entity indirectly involved in a relationship between two principles.






41. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.






42. A computer process that requests a service from another computer and accepts the server's responses.






43. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.






44. Cracking Tools






45. don't ping






46. The act of checking some sequence of tokens for the presence of the constituents of some pattern.






47. A record showing which user has accessed a given resource and what operations the user performed during a given period.






48. Xmas Tree scan






49. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.






50. In regard to hash algorithms - this occurs when two or more distinct inputs produce the same output.