Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.






2. Formal description and evaluation of the vulnerabilities in an information system






3. Black hat






4. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks






5. Malware designed to install some sort of virus - backdoor - and so on - on a target system.






6. LM Hash for short passwords (under 7)






7. Used for exchanging structured information - such as XML-based messages - in the implementation of web services






8. A social-engineering attack using computer resources - such as e-mail or IRC.






9. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.






10. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






11. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col






12. Another term for firewalking






13. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.






14. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).






15. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.






16. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.






17. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.






18. A tool that helps a company to compare its actual performance with its potential performance.






19. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.






20. ICMP Ping






21. IP Protocol Scan






22. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets






23. Nmap normal output






24. A protocol defining packets that are able to be routed by a router.






25. An informed decision to accept the potential for damage to or loss of an IT asset.






26. A software or hardware application or device that captures user keystrokes.






27. A record showing which user has accessed a given resource and what operations the user performed during a given period.






28. ICMP Type/Code 3-13






29. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur






30. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa






31. An agreement between the penetration tester and the client detailing the activities the tester is permitted to perform.






32. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.






33. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.






34. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.






35. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).






36. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.






37. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.






38. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat






39. Paranoid scan timing






40. Computer software or hardware that can intercept and log traffic passing over a digital network.






41. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door






42. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main






43. A communications protocol used for browsing the Internet.






44. The act of checking some sequence of tokens for the presence of the constituents of some pattern.






45. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.






46. A virus written in a macro language and usually embedded in document or spreadsheet files.






47. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.






48. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c






49. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio






50. Policy stating what users of a system can and cannot do with the organization's assets.