Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.






2. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)






3. Access by information systems (or users) communicating from outside the information system security perimeter.






4. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.






5. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.






6. The potential for damage to or loss of an IT asset






7. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi






8. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.






9. The level of importance assigned to an IT asset






10. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.






11. TCP Ping






12. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio






13. An unknown deficiency in software or some other product that results in a security vulnerability being identified.






14. Aggressive scan timing






15. Wrapper or Binder






16. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.






17. A business - government agency - or educational institution that provides access to the Internet.






18. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col






19. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.






20. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.






21. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.






22. Vulnerability Scanning






23. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.






24. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr






25. UDP Scan






26. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.






27. Network Scanning






28. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption






29. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.






30. CAN-SPAM






31. The Security Accounts Manager file in Windows stores all the password hashes for the system.






32. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.






33. Policy stating what users of a system can and cannot do with the organization's assets.






34. The last portion of the SID that identifies the user to the system in Windows. A RID of 500 identifies the administrator account.






35. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.






36. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.






37. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.






38. An evaluation conducted to determine the potential for damage to or loss of an IT asset.






39. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.






40. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.






41. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U






42. A command used in HTTP and FTP to retrieve a file from a server.






43. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the






44. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.






45. Formal description and evaluation of the vulnerabilities in an information system






46. ICMP Netmask






47. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.






48. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.






49. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.






50. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.