Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.






2. A business - government agency - or educational institution that provides access to the Internet.






3. A Windows-based GUI version of nmap.






4. The act or actions of a hacker to put forward a cause or a political agenda - to affect some societal change - or to shed light on something he feels to be political injustice. These activities are usually illegal in nature.






5. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.






6. CAN-SPAM






7. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.






8. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door






9. List Scan






10. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.






11. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.






12. A document describing information security guidelines - policies - procedures - and standards.






13. Ping Scan






14. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.






15. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).






16. Port 88






17. Microsoft SID 500






18. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.






19. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.






20. The condition of a resource being ready for use and accessible by authorized users.






21. A command used in HTTP and FTP to retrieve a file from a server.






22. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO






23. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.






24. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.






25. A portion of memory used to temporarily store output or input data.






26. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response






27. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.






28. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.






29. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.






30. A wireless networking mode where all clients connect to the wireless network through a central access point.






31. Computer software or hardware that can intercept and log traffic passing over a digital network.






32. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.






33. An Internet routing protocol used to exchange routing information within an autonomous system.






34. A computer file system architecture used in Windows - OS/2 - and most memory cards.






35. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.






36. Wrapper or Binder






37. Port 23






38. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.






39. ICMP Ping






40. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






41. Used for exchanging structured information - such as XML-based messages - in the implementation of web services






42. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






43. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.






44. Looking over an authorized user's shoulder in order to steal information (such as authentication information).






45. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.






46. Using conversation or some other interaction between people to gather useful information.






47. An informed decision to accept the potential for damage to or loss of an IT asset.






48. The steps taken to gather evidence and information on the targets you wish to attack.






49. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie






50. ICMP Type/Code 3