Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.






2. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.






3. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -






4. nmap






5. Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or eight-digit hexadecimal number.






6. Using conversation or some other interaction between people to gather useful information.






7. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.






8. ex 02






9. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.






10. A virus that plants itself in a system's boot sector and infects the master boot record.






11. A group of people - gathered together by a business entity - working to address a specific problem or goal.






12. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.






13. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is






14. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).






15. An anonymous connection to an administrative share (IPC$) on a Windows machine. Null sessions allow for enumeration of Windows machines - among other attacks.






16. White hat






17. An agreement between the penetration tester and the client detailing the activities the tester is permitted to perform.






18. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks






19. IP Protocol Scan






20. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.






21. Normal scan timing






22. A software or hardware application or device that captures user keystrokes.






23. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.






24. Policy stating what users of a system can and cannot do with the organization's assets.






25. An Application layer protocol for sending electronic mail between servers.






26. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.






27. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.






28. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.






29. CAN-SPAM






30. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman






31. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.






32. Hashing algorithm that results in a 128-bit output.






33. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.






34. The lack of clocking (imposed time ordering) on a bit stream.






35. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.






36. Nmap grepable output






37. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.






38. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.






39. A tool that helps a company to compare its actual performance with its potential performance.






40. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.






41. A wireless networking mode where all clients connect to the wireless network through a central access point.






42. Establish Null Session






43. A storage buffer that transparently stores data so future requests for the same data can be served faster.






44. Software code - a portion of data - or sequence of commands intended to take advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware.






45. A person or entity indirectly involved in a relationship between two principles.






46. The process of systematically testing each port on a firewall to map rules and determine accessible ports.






47. The last portion of the SID that identifies the user to the system in Windows. A RID of 500 identifies the administrator account.






48. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.






49. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.






50. A social-engineering attack using computer resources - such as e-mail or IRC.