Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door






2. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio






3. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public






4. ICMP Ping






5. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.






6. The Security Accounts Manager file in Windows stores all the password hashes for the system.






7. ICMP Netmask






8. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






9. nmap all output






10. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.






11. A one-way mathematical function that generates a fixedlength numerical string (hash) from a given data input. MD5 and SHA-1 are hashing algorithms.






12. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.






13. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).






14. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.






15. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu






16. Port 135






17. A social-engineering attack that manipulates the victim into calling the attacker for help.






18. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.






19. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.






20. A type of encryption where the same key is used to encrypt and decrypt the message.






21. Recording the time - normally in a log file - when an event happens or when information is created or modified.






22. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.






23. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.






24. The ability to trace actions performed on a system to a specific user or system entity.






25. The process of systematically testing each port on a firewall to map rules and determine accessible ports.






26. In computer security - this is an algorithm that uses separate keys for encryption and decryption.






27. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.






28. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.






29. Port 31337






30. 18 U.S.C. 1029






31. Policy stating what users of a system can and cannot do with the organization's assets.






32. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo






33. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption






34. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.






35. Establish Null Session






36. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.






37. Port 23






38. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.






39. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie






40. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.






41. The concept of having more than one person required to complete a task






42. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.






43. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.






44. Incremental Substitution






45. Any network incident that prompts some kind of log entry or other notification.






46. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.






47. A software or hardware defect that often results in system vulnerabilities.






48. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with






49. Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or eight-digit hexadecimal number.






50. A social-engineering effort in which the attacker pretends to be an employee - a valid user - or even an executive to elicit information or access.