Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -






2. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.






3. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use






4. MAC Flooding






5. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par






6. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.






7. Normal scan timing






8. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






9. A routing protocol developed to be used within a single organization.






10. Port 137/138/139






11. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr






12. The conveying of official access or legal power to a person or entity.






13. The transmission of digital signals without precise clocking or synchronization.






14. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).






15. A file system used by the Mac OS.






16. ICMP Ping






17. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets






18. Any circumstance or event with the potential to adversely impact organizationaloperations - organizational assets - or individuals through an information system via unauthorized access - destruction - disclosure - modification of information - and/or






19. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.






20. The concept of having more than one person required to complete a task






21. A virus that plants itself in a system's boot sector and infects the master boot record.






22. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points






23. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.






24. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.






25. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.






26. Used for exchanging structured information - such as XML-based messages - in the implementation of web services






27. A series of documents and notes on standards used or proposed for use on the Internet; each is identified by a number.






28. Black box test






29. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.






30. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.






31. The last portion of the SID that identifies the user to the system in Windows. A RID of 500 identifies the administrator account.






32. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.






33. The potential for damage to or loss of an IT asset






34. A defined measure of service within a network system






35. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.






36. NSA






37. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.






38. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.






39. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.






40. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.






41. RPC Scan






42. A program designed to execute at a specific time to release malicious code onto the computer system or network.






43. Phases of an attack






44. When an authorized person allows (intentionally or unintentionally) someone to pass through a secure door - despite the fact that the intruder does not have a badge.






45. Controls to detect anomalies or undesirable events occurring on a system.






46. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.






47. Two or more LANs connected by a high-speed line across a large geographical area.






48. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).






49. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.






50. The process of systematically testing each port on a firewall to map rules and determine accessible ports.