Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Two or more LANs connected by a high-speed line across a large geographical area.






2. The exploitation of a security vulnerability






3. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






4. A point of reference used to mark an initial state in order to manage change.






5. SYN Ping






6. 18 U.S.C. 1030






7. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.






8. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.






9. A systematic process for the assessment of security vulnerabilities.






10. NSA






11. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman






12. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator






13. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.






14. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).






15. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.






16. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.






17. Hex 12






18. Ports 20/21






19. A computer virus that infects and spreads in multiple ways.






20. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.






21. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.






22. Malware designed to install some sort of virus - backdoor - and so on - on a target system.






23. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.






24. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.






25. Any network incident that prompts some kind of log entry or other notification.






26. CAN-SPAM






27. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr






28. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely






29. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.






30. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur






31. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.






32. An Application layer protocol for sending electronic mail between servers.






33. A backlog of packets stored in buffers and waiting to be forwarded over an interface.






34. The art and science of creating a covert message or image within another message - image - audio - or video file.






35. A computer process that requests a service from another computer and accepts the server's responses.






36. A virus that plants itself in a system's boot sector and infects the master boot record.






37. A one-way mathematical function that generates a fixedlength numerical string (hash) from a given data input. MD5 and SHA-1 are hashing algorithms.






38. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p






39. Attacks on the actual programming code of an application.






40. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).






41. Network Scanning






42. A Windows-based GUI version of nmap.






43. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.






44. The software product or system that is the subject of an evaluation.






45. A record showing which user has accessed a given resource and what operations the user performed during a given period.






46. Port 23






47. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination






48. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.






49. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col






50. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.