Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -






2. Port 110






3. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.






4. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.






5. A data encryption/decryption program often used for e-mail and file storage.






6. Nmap normal output






7. nmap all output






8. The condition of a resource being ready for use and accessible by authorized users.






9. Malware designed to install some sort of virus - backdoor - and so on - on a target system.






10. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.






11. Directing a protocol from one port to another.






12. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.






13. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.






14. Controls to detect anomalies or undesirable events occurring on a system.






15. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.






16. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).






17. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.






18. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio






19. NSA






20. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the






21. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.






22. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.






23. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g






24. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points






25. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).






26. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP






27. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.






28. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






29. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination






30. Injecting traffic into the network to identify the operating system of a device.






31. The steps taken to gather evidence and information on the targets you wish to attack.






32. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o






33. Port 161/162






34. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.






35. A record showing which user has accessed a given resource and what operations the user performed during a given period.






36. The change or growth of a project's scope






37. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.






38. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.






39. The art and science of creating a covert message or image within another message - image - audio - or video file.






40. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door






41. A protocol used for sending and receiving log information for nodes on a network.






42. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c






43. Ports 20/21






44. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.






45. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.






46. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.






47. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response






48. A computer virus that infects and spreads in multiple ways.






49. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.






50. Directory Transversal