Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An Application layer protocol for managing devices on an IP network.






2. Black box test






3. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.






4. Aggressive scan timing






5. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.






6. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.






7. A program designed to execute at a specific time to release malicious code onto the computer system or network.






8. The art and science of creating a covert message or image within another message - image - audio - or video file.






9. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.






10. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu






11. Hashing algorithm that results in a 128-bit output.






12. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.






13. An attack that exploits the common mistake many people make when installing operating systems






14. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.






15. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman






16. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio






17. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.






18. Port 389






19. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.






20. Version Detection Scan






21. Insane scan timing






22. LM Hash for short passwords (under 7)






23. PI and PT Ping






24. Ports 20/21






25. In computer security - this is an algorithm that uses separate keys for encryption and decryption.






26. Nmap normal output






27. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.






28. ICMP Type/Code 0-0






29. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.






30. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.






31. Directory Transversal






32. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.






33. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).






34. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.






35. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.






36. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.






37. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.






38. Another term for firewalking






39. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.






40. White hat






41. Port 22






42. The process of using easily accessible DNS records to map a target network's internal hosts.






43. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.






44. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.






45. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.






46. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.






47. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.






48. A computer virus that infects and spreads in multiple ways.






49. A routing protocol developed to be used within a single organization.






50. Polite scan timing