Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.






2. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.






3. The combination of all IT assets - resources - components - and systems.






4. A computer file system architecture used in Windows - OS/2 - and most memory cards.






5. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.






6. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.






7. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.






8. Wrapper or Binder






9. Another term for firewalking






10. A series of documents and notes on standards used or proposed for use on the Internet; each is identified by a number.






11. Looking over an authorized user's shoulder in order to steal information (such as authentication information).






12. A device on a network.






13. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr






14. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.






15. The act or actions of a hacker to put forward a cause or a political agenda - to affect some societal change - or to shed light on something he feels to be political injustice. These activities are usually illegal in nature.






16. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.






17. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col






18. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.






19. A small Trojan program that listens on port 777.






20. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t






21. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.






22. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.






23. A type of encryption where the same key is used to encrypt and decrypt the message.






24. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)






25. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






26. The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information






27. ex 02






28. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.






29. The process of determining if a network entity (user or service) is legitimate






30. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie






31. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.






32. Port 31337






33. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.






34. NSA






35. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.






36. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.






37. A communications protocol used for browsing the Internet.






38. ICMP Type/Code 3-13






39. A type of malware that covertly collects information about a user.






40. The condition of a resource being ready for use and accessible by authorized users.






41. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.






42. An anonymous connection to an administrative share (IPC$) on a Windows machine. Null sessions allow for enumeration of Windows machines - among other attacks.






43. Port 137/138/139






44. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.






45. A business - government agency - or educational institution that provides access to the Internet.






46. The process of embedding information into a digital signal in a way that makes it difficult to remove.






47. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur






48. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g






49. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.






50. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.