Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.






2. Used for exchanging structured information - such as XML-based messages - in the implementation of web services






3. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.






4. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)






5. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.






6. A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.






7. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.






8. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.






9. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.






10. RPC Scan






11. Describes practices in production and development that promote access to the end product's source materials.






12. A computer process that requests a service from another computer and accepts the server's responses.






13. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.






14. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.






15. A storage buffer that transparently stores data so future requests for the same data can be served faster.






16. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.






17. A social-engineering attack that manipulates the victim into calling the attacker for help.






18. A series of documents and notes on standards used or proposed for use on the Internet; each is identified by a number.






19. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.






20. ICMP Timestamp






21. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets






22. A data encryption/decryption program often used for e-mail and file storage.






23. Window Scan






24. Ping Scan






25. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.






26. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.






27. Normal scan timing






28. Phases of an attack






29. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.






30. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all






31. An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.






32. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.






33. White hat






34. The last portion of the SID that identifies the user to the system in Windows. A RID of 500 identifies the administrator account.






35. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)






36. The monetary value assigned to an IT asset.






37. A one-way mathematical function that generates a fixedlength numerical string (hash) from a given data input. MD5 and SHA-1 are hashing algorithms.






38. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.






39. A virus written in a macro language and usually embedded in document or spreadsheet files.






40. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.






41. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.






42. CAN-SPAM






43. The process of determining if a network entity (user or service) is legitimate






44. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.






45. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.






46. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.






47. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.






48. NSA






49. ICMP Type/Code 3-13






50. A virus designed to infect the master boot record.