Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi






2. Polymorphic Virus






3. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.






4. An attack that combines a brute-force attack with a dictionary attack.






5. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.






6. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.






7. Hex 14






8. A social-engineering effort in which the attacker pretends to be an employee - a valid user - or even an executive to elicit information or access.






9. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.






10. The concept of having more than one person required to complete a task






11. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.






12. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






13. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.






14. A protocol used for sending and receiving log information for nodes on a network.






15. A storage buffer that transparently stores data so future requests for the same data can be served faster.






16. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori






17. The process of determining if a network entity (user or service) is legitimate






18. Hex 12






19. A command used in HTTP and FTP to retrieve a file from a server.






20. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.






21. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).






22. A portion of memory used to temporarily store output or input data.






23. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa






24. A defined measure of service within a network system






25. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)






26. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.






27. A computer process that requests a service from another computer and accepts the server's responses.






28. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.






29. A group of experts that handles computer security incidents.






30. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive






31. A person or entity indirectly involved in a relationship between two principles.






32. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.






33. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.






34. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)






35. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).






36. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.






37. ICMP Type/Code 11






38. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U






39. A one-way mathematical function that generates a fixedlength numerical string (hash) from a given data input. MD5 and SHA-1 are hashing algorithms.






40. Wrapper or Binder






41. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.






42. An attack in which a hacker steps between two ends of an already-established communication session and uses specialized tools to guess sequence numbers to take over the channel.






43. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination






44. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.






45. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory






46. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.






47. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.






48. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.






49. The conveying of official access or legal power to a person or entity.






50. A computer network confined to a relatively small area - such as a single building or campus.