Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Monitoring of telephone or Internet conversations - typically by covert means.






2. Controls to detect anomalies or undesirable events occurring on a system.






3. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.






4. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.






5. TCP connect() scan






6. Hex 12






7. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.






8. A protocol defining packets that are able to be routed by a router.






9. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main






10. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.






11. The last portion of the SID that identifies the user to the system in Windows. A RID of 500 identifies the administrator account.






12. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.






13. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.






14. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.






15. A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.






16. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).






17. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).






18. The potential for damage to or loss of an IT asset






19. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.






20. Evaluation in which testers attempt to penetrate the network.






21. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






22. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.






23. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO






24. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).






25. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman






26. Hashing algorithm that results in a 128-bit output.






27. don't ping






28. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.






29. ICMP Type/Code 3-13






30. An Internet routing protocol used to exchange routing information within an autonomous system.






31. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.






32. Polymorphic Virus






33. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.






34. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.






35. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.






36. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can






37. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.






38. A virus written in a macro language and usually embedded in document or spreadsheet files.






39. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.






40. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.






41. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.






42. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination






43. Describes practices in production and development that promote access to the end product's source materials.






44. An informed decision to accept the potential for damage to or loss of an IT asset.






45. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points






46. Any network incident that prompts some kind of log entry or other notification.






47. A list of IP addresses and corresponding MAC addresses stored on a local computer.






48. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.






49. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.






50. ICMP Netmask