Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).






2. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.






3. An evaluation conducted to determine the potential for damage to or loss of an IT asset.






4. A section or subset of the network. Often a router or other routing device provides the end point of the segment.






5. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






6. TCP SYN Scan






7. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.






8. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).






9. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.






10. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)






11. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.






12. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).






13. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.






14. ICMP Type/Code 3-13






15. Port 31337






16. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.






17. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.






18. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.






19. A routing protocol developed to be used within a single organization.






20. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.






21. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.






22. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.






23. An anonymous connection to an administrative share (IPC$) on a Windows machine. Null sessions allow for enumeration of Windows machines - among other attacks.






24. Looking over an authorized user's shoulder in order to steal information (such as authentication information).






25. Port 80/81/8080






26. Aggressive scan timing






27. A software or hardware defect that often results in system vulnerabilities.






28. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.






29. An Application layer protocol for managing devices on an IP network.






30. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.






31. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.






32. A social-engineering attack using computer resources - such as e-mail or IRC.






33. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.






34. Wrapper or Binder






35. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a






36. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.






37. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.






38. Formal description and evaluation of the vulnerabilities in an information system






39. An organized collection of data.






40. The concept of having more than one person required to complete a task






41. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.






42. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response






43. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.






44. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.






45. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.






46. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.






47. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.






48. Attacks on the actual programming code of an application.






49. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.






50. TCP Ping