Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In computer security - this is an algorithm that uses separate keys for encryption and decryption.






2. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.






3. TCP Ping






4. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).






5. The conveying of official access or legal power to a person or entity.






6. A command used in HTTP and FTP to retrieve a file from a server.






7. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.






8. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination






9. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.






10. Incremental Substitution






11. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






12. NSA






13. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.






14. A computer virus that infects and spreads in multiple ways.






15. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.






16. Name given to expert groups that handle computer security incidents.






17. nmap all output






18. Black box test






19. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.






20. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.






21. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.






22. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.






23. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).






24. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.






25. The potential for damage to or loss of an IT asset






26. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.






27. Formal description and evaluation of the vulnerabilities in an information system






28. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.






29. Controls to detect anomalies or undesirable events occurring on a system.






30. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.






31. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.






32. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.






33. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).






34. Ports 20/21






35. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).






36. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.






37. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely






38. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o






39. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio






40. The process of determining if a network entity (user or service) is legitimate






41. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc






42. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.






43. White box test






44. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.






45. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.






46. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.






47. SYN Ping






48. Part of a service contract where the level of service is formally defined; may be required as part of the initial pen test agreements.






49. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.






50. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.