Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.






2. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.






3. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.






4. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.






5. Hex 12






6. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.






7. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.






8. FIN Scan






9. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






10. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi






11. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.






12. IP Protocol Scan






13. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.






14. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).






15. A series of documents and notes on standards used or proposed for use on the Internet; each is identified by a number.






16. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)






17. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a






18. Name given to expert groups that handle computer security incidents.






19. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.






20. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets






21. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.






22. A Canonical Name record within DNS - used to provide an alias for a domain name.






23. An Application layer protocol for sending electronic mail between servers.






24. A protocol defining packets that are able to be routed by a router.






25. A mode of operation in a wireless LAN in which clients send data directly to one another without utilizing a wireless access point (WAP) - much like a point-to-point wired connection.






26. Another term for firewalking






27. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p






28. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.






29. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.






30. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.






31. ICMP Type/Code 3






32. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).






33. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.






34. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.






35. RPC Scan






36. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par






37. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.






38. A business - government agency - or educational institution that provides access to the Internet.






39. TCP SYN Scan






40. The change or growth of a project's scope






41. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.






42. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.






43. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.






44. A social-engineering attack using computer resources - such as e-mail or IRC.






45. In computer security - this is an algorithm that uses separate keys for encryption and decryption.






46. A communications protocol used for browsing the Internet.






47. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.






48. The act or actions of a hacker to put forward a cause or a political agenda - to affect some societal change - or to shed light on something he feels to be political injustice. These activities are usually illegal in nature.






49. Port 161/162






50. A point of reference used to mark an initial state in order to manage change.