Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Process of breaking a packet into smaller units when it is being transmitted over a network medium that's unable to support a transmission unit the original size of the packet.






2. ex 02






3. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.






4. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra






5. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.






6. An evaluation conducted to determine the potential for damage to or loss of an IT asset.






7. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all






8. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.






9. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






10. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a






11. A protocol used to pass control and error messages between nodes on the Internet.






12. A configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just frames addressed to it






13. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr






14. Ports 20/21






15. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is






16. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).






17. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.






18. TCP Ping






19. A virus written in a macro language and usually embedded in document or spreadsheet files.






20. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.






21. A virus that plants itself in a system's boot sector and infects the master boot record.






22. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.






23. Describes practices in production and development that promote access to the end product's source materials.






24. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.






25. Port 137/138/139






26. The potential for damage to or loss of an IT asset






27. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.






28. Version Detection Scan






29. A record showing which user has accessed a given resource and what operations the user performed during a given period.






30. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.






31. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi






32. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.






33. Nmap ml output






34. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.






35. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






36. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






37. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.






38. The last portion of the SID that identifies the user to the system in Windows. A RID of 500 identifies the administrator account.






39. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.






40. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory






41. Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.






42. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo






43. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.






44. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.






45. An Application layer protocol for sending electronic mail between servers.






46. Injecting traffic into the network to identify the operating system of a device.






47. Occurs when authorized users accumulate excess privileges on a system due to moving from position to position.






48. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.






49. A protocol defining packets that are able to be routed by a router.






50. The process of using easily accessible DNS records to map a target network's internal hosts.