Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The act of checking some sequence of tokens for the presence of the constituents of some pattern.






2. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory






3. nmap






4. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.






5. A virus designed to infect the master boot record.






6. Insane scan timing






7. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio






8. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.






9. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the






10. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.






11. RPC Scan






12. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).






13. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.






14. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.






15. A wireless networking mode where all clients connect to the wireless network through a central access point.






16. Black box test






17. TCP connect() scan






18. An anonymous connection to an administrative share (IPC$) on a Windows machine. Null sessions allow for enumeration of Windows machines - among other attacks.






19. The lack of clocking (imposed time ordering) on a bit stream.






20. Also known as the dot-dot-slash attack. Using directory traversal - the attacker attempts to access restricted directories and execute commands outside intended web server directories by using the URL to redirect to an unintended folder location.






21. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)






22. 18 U.S.C. 1030






23. The potential for damage to or loss of an IT asset






24. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g






25. Nmap grepable output






26. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.






27. Drawing symbols in public places to alert others to an open Wi-Fi network. War chalking can include the SSIDs - administrative passwords to APs - and other information.






28. don't ping






29. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.






30. Shifting responsibility from one party to another






31. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.






32. An adapter that provides the physical connection to send and receive data between the computer and the network media.






33. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu






34. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.






35. Process of breaking a packet into smaller units when it is being transmitted over a network medium that's unable to support a transmission unit the original size of the packet.






36. A list of IP addresses and corresponding MAC addresses stored on a local computer.






37. The process of using easily accessible DNS records to map a target network's internal hosts.






38. A file system used by the Mac OS.






39. The exploitation of a security vulnerability






40. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.






41. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.






42. 18 U.S.C. 1029






43. MAC Flooding






44. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.






45. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.






46. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.






47. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.






48. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.






49. Recording the time - normally in a log file - when an event happens or when information is created or modified.






50. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are