Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 18 U.S.C. 1029






2. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.






3. ICMP Timestamp






4. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.






5. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.






6. Evaluation in which testers attempt to penetrate the network.






7. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.






8. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.






9. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.






10. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.






11. Any circumstance or event with the potential to adversely impact organizationaloperations - organizational assets - or individuals through an information system via unauthorized access - destruction - disclosure - modification of information - and/or






12. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.






13. Port 31337






14. FIN Scan






15. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.






16. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.






17. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.






18. A command used in HTTP and FTP to retrieve a file from a server.






19. UDP Scan






20. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.






21. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.






22. An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET.






23. The potential for damage to or loss of an IT asset






24. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.






25. An informed decision to accept the potential for damage to or loss of an IT asset.






26. The combination of all IT assets - resources - components - and systems.






27. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.






28. Looking over an authorized user's shoulder in order to steal information (such as authentication information).






29. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.






30. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).






31. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.






32. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.






33. The concept of having more than one person required to complete a task






34. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.






35. Microsoft SID 500






36. Used for exchanging structured information - such as XML-based messages - in the implementation of web services






37. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.






38. Wrapper or Binder






39. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.






40. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.






41. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.






42. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive






43. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -






44. Port 23






45. A small Trojan program that listens on port 777.






46. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.






47. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.






48. In computer security - this is an algorithm that uses separate keys for encryption and decryption.






49. Phases of an attack






50. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.