Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points






2. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)






3. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.






4. A wireless networking mode where all clients connect to the wireless network through a central access point.






5. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.






6. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door






7. An unknown deficiency in software or some other product that results in a security vulnerability being identified.






8. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.






9. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.






10. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).






11. A program designed to execute at a specific time to release malicious code onto the computer system or network.






12. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.






13. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.






14. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.






15. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.






16. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).






17. Vulnerability Scanning






18. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par






19. Port Scanning






20. 18 U.S.C. 1029






21. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.






22. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response






23. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.






24. Transmitting one protocol encapsulated inside another protocol.






25. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.






26. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.






27. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.






28. Computer software or hardware that can intercept and log traffic passing over a digital network.






29. 18 U.S.C. 1030






30. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.






31. The software product or system that is the subject of an evaluation.






32. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.






33. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio






34. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.






35. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.






36. A protocol used for sending and receiving log information for nodes on a network.






37. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.






38. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.






39. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.






40. An informed decision to accept the potential for damage to or loss of an IT asset.






41. Access by information systems (or users) communicating from outside the information system security perimeter.






42. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.






43. An attack in which a hacker steps between two ends of an already-established communication session and uses specialized tools to guess sequence numbers to take over the channel.






44. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all






45. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.






46. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).






47. A backlog of packets stored in buffers and waiting to be forwarded over an interface.






48. A communications protocol used for browsing the Internet.






49. In computer security - this is an algorithm that uses separate keys for encryption and decryption.






50. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a