Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).






2. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.






3. The process of using easily accessible DNS records to map a target network's internal hosts.






4. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.






5. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.






6. A virus designed to infect the master boot record.






7. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.






8. ICMP Netmask






9. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.






10. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.






11. The monetary value assigned to an IT asset.






12. A point of reference used to mark an initial state in order to manage change.






13. Xmas Tree scan






14. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.






15. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.






16. A principle in security engineering that attempts to use anonymity and secrecy (of design - implementation - and so on) to provide security; the footprint of the organization - entity - network - or system is kept as small as possible to avoid intere






17. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.






18. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.






19. nmap all output






20. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.






21. Port 110






22. A method of external testing whereby several systems or resources are used together to effect an attack.






23. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.






24. The process of embedding information into a digital signal in a way that makes it difficult to remove.






25. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.






26. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).






27. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.






28. Polymorphic Virus






29. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






30. LM Hash for short passwords (under 7)






31. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.






32. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.






33. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.






34. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.






35. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.






36. An attack in which a hacker steps between two ends of an already-established communication session and uses specialized tools to guess sequence numbers to take over the channel.






37. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.






38. Transmitting one protocol encapsulated inside another protocol.






39. ICMP Ping






40. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.






41. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.






42. Port 137/138/139






43. A group of experts that handles computer security incidents.






44. Port 161/162






45. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.






46. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.






47. A Windows-based GUI version of nmap.






48. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.






49. Network Scanning






50. A software or hardware defect that often results in system vulnerabilities.






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests