Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. White hat






2. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.






3. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.






4. LM Hash for short passwords (under 7)






5. A tool that helps a company to compare its actual performance with its potential performance.






6. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.






7. Xmas Tree scan






8. A Canonical Name record within DNS - used to provide an alias for a domain name.






9. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).






10. Two or more LANs connected by a high-speed line across a large geographical area.






11. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is






12. An Internet routing protocol used to exchange routing information within an autonomous system.






13. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.






14. The act of dialing all numbers within an organization to discover open modems.






15. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.






16. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.






17. A command that instructs the system processor to do nothing. Many overflow attacks involve stringing several NOP operations together (known as a NOP sled).






18. Shifting responsibility from one party to another






19. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.






20. A type of malware that covertly collects information about a user.






21. CAN-SPAM






22. An Application layer protocol for sending electronic mail between servers.






23. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio






24. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.






25. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.






26. UDP Scan






27. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.






28. An adapter that provides the physical connection to send and receive data between the computer and the network media.






29. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.






30. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.






31. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.






32. ICMP Type/Code 3-13






33. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.






34. TCP SYN Scan






35. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.






36. A principle in security engineering that attempts to use anonymity and secrecy (of design - implementation - and so on) to provide security; the footprint of the organization - entity - network - or system is kept as small as possible to avoid intere






37. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.






38. Black hat






39. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.






40. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.






41. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






42. Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.






43. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.






44. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.






45. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action






46. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.






47. Used for exchanging structured information - such as XML-based messages - in the implementation of web services






48. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.






49. MAC Flooding






50. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.