Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.






2. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.






3. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.






4. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator






5. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.






6. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.






7. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.






8. A Windows-based GUI version of nmap.






9. Formal description and evaluation of the vulnerabilities in an information system






10. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP






11. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use






12. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive






13. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col






14. A group of people - gathered together by a business entity - working to address a specific problem or goal.






15. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.






16. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks






17. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.






18. Port 80/81/8080






19. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).






20. nmap all output






21. ACK Scan






22. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.






23. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.






24. Any network incident that prompts some kind of log entry or other notification.






25. ICMP Ping






26. ICMP Type/Code 11






27. A principle in security engineering that attempts to use anonymity and secrecy (of design - implementation - and so on) to provide security; the footprint of the organization - entity - network - or system is kept as small as possible to avoid intere






28. Phases of an attack






29. A protocol for exchanging packets over a serial line.






30. In computer security - this is an algorithm that uses separate keys for encryption and decryption.






31. Xmas Tree scan






32. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.






33. 18 U.S.C. 1029






34. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.






35. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.






36. The default network authentication suite of protocols for Windows NT 4.0






37. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).






38. Another term for firewalking






39. Nmap grepable output






40. A configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just frames addressed to it






41. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.






42. Hex 04






43. A documented process for a procedure designed to be consistent - repeatable - and accountable.






44. A file system used by the Mac OS.






45. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.






46. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.






47. A host designed to collect data on suspicious activity.






48. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.






49. Name given to expert groups that handle computer security incidents.






50. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman