Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Controls to detect anomalies or undesirable events occurring on a system.






2. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.






3. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.






4. The process of determining if a network entity (user or service) is legitimate






5. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.






6. Another term for firewalking






7. The steps taken to gather evidence and information on the targets you wish to attack.






8. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.






9. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.






10. The level of importance assigned to an IT asset






11. UDP Scan






12. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.






13. ICMP Timestamp






14. A social-engineering attack using computer resources - such as e-mail or IRC.






15. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.






16. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.






17. Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.






18. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.






19. Using conversation or some other interaction between people to gather useful information.






20. Formal description and evaluation of the vulnerabilities in an information system






21. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO






22. Attacks on the actual programming code of an application.






23. A virus that plants itself in a system's boot sector and infects the master boot record.






24. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.






25. The condition of a resource being ready for use and accessible by authorized users.






26. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.






27. Hashing algorithm that results in a 128-bit output.






28. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.






29. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.






30. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.






31. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.






32. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio






33. An attack that exploits the common mistake many people make when installing operating systems






34. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a






35. ICMP Type/Code 3-13






36. PI and PT Ping






37. A social-engineering attack that manipulates the victim into calling the attacker for help.






38. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






39. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.






40. A group of experts that handles computer security incidents.






41. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all






42. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.






43. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.






44. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.






45. Transmitting one protocol encapsulated inside another protocol.






46. A tool that helps a company to compare its actual performance with its potential performance.






47. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.






48. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.






49. A protocol used for sending and receiving log information for nodes on a network.






50. A computer process that requests a service from another computer and accepts the server's responses.