Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The act of dialing all numbers within an organization to discover open modems.






2. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.






3. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






4. Aggressive scan timing






5. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the






6. Port 161/162






7. An Internet routing protocol used to exchange routing information within an autonomous system.






8. UDP Scan






9. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption






10. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points






11. Nmap ml output






12. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.






13. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.






14. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.






15. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.






16. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -






17. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.






18. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a






19. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.






20. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.






21. A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.






22. In computer security - this is an algorithm that uses separate keys for encryption and decryption.






23. Evaluation in which testers attempt to penetrate the network.






24. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.






25. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par






26. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.






27. Normal scan timing






28. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.






29. A protocol used for sending and receiving log information for nodes on a network.






30. A protocol defining packets that are able to be routed by a router.






31. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.






32. A document describing information security guidelines - policies - procedures - and standards.






33. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).






34. Microsoft SID 500






35. Hex 04






36. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.






37. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can






38. A communications protocol used for browsing the Internet.






39. Hashing algorithm that results in a 128-bit output.






40. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.






41. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.






42. Polite scan timing






43. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.






44. Any network incident that prompts some kind of log entry or other notification.






45. Security identifier. The method by which Windows identifies user - group - and computer accounts for rights and permissions.






46. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.






47. IP Protocol Scan






48. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).






49. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.






50. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all