Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information






2. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.






3. A business - government agency - or educational institution that provides access to the Internet.






4. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.






5. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio






6. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.






7. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.






8. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.






9. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.






10. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.






11. A routing protocol developed to be used within a single organization.






12. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator






13. Independent review and examination of records and activities to assess the adequacy of system controls - to ensure compliance with established policies and operational procedures - and to recommend necessary changes.






14. A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.






15. Port 161/162






16. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.






17. Two or more LANs connected by a high-speed line across a large geographical area.






18. An adapter that provides the physical connection to send and receive data between the computer and the network media.






19. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.






20. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.






21. A device on a network.






22. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.






23. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.






24. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.






25. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.






26. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.






27. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.






28. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.






29. Black hat






30. Any network incident that prompts some kind of log entry or other notification.






31. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.






32. Describes practices in production and development that promote access to the end product's source materials.






33. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.






34. The condition of a resource being ready for use and accessible by authorized users.






35. Nmap normal output






36. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private






37. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.






38. Another term for firewalking






39. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks






40. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.






41. A Canonical Name record within DNS - used to provide an alias for a domain name.






42. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.






43. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U






44. The last portion of the SID that identifies the user to the system in Windows. A RID of 500 identifies the administrator account.






45. A protocol for exchanging packets over a serial line.






46. Computer software or hardware that can intercept and log traffic passing over a digital network.






47. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.






48. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.






49. Establish Null Session






50. nmap