Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Aggressive scan timing






2. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.






3. Using conversation or some other interaction between people to gather useful information.






4. An unknown deficiency in software or some other product that results in a security vulnerability being identified.






5. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.






6. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.






7. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.






8. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.






9. A denial-of-service technique that uses numerous hosts to perform the attack.






10. Policy stating what users of a system can and cannot do with the organization's assets.






11. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.






12. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.






13. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.






14. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is






15. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.






16. White box test






17. Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.






18. A virus written in a macro language and usually embedded in document or spreadsheet files.






19. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.






20. The process of embedding information into a digital signal in a way that makes it difficult to remove.






21. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.






22. A string that represents the location of a web resource






23. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.






24. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.






25. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.






26. SYN Ping






27. A record showing which user has accessed a given resource and what operations the user performed during a given period.






28. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.






29. A method of external testing whereby several systems or resources are used together to effect an attack.






30. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive






31. A device providing temporary - on-demand - point-to-point network access to users.






32. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.






33. Network Scanning






34. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.






35. A section or subset of the network. Often a router or other routing device provides the end point of the segment.






36. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO






37. A social-engineering attack using computer resources - such as e-mail or IRC.






38. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.






39. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.






40. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory






41. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.






42. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks






43. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points






44. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.






45. The act or actions of a hacker to put forward a cause or a political agenda - to affect some societal change - or to shed light on something he feels to be political injustice. These activities are usually illegal in nature.






46. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.






47. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






48. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.






49. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.






50. A protocol for exchanging packets over a serial line.