Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The concept of having more than one person required to complete a task






2. Sneaky scan timing






3. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.






4. Name given to expert groups that handle computer security incidents.






5. Cracking Tools






6. A software or hardware application or device that captures user keystrokes.






7. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.






8. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa






9. CAN-SPAM






10. Nmap grepable output






11. A device providing temporary - on-demand - point-to-point network access to users.






12. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.






13. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.






14. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.






15. White hat






16. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.






17. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.






18. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.






19. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can






20. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.






21. Ports 20/21






22. Hex 14






23. The art and science of creating a covert message or image within another message - image - audio - or video file.






24. The level of importance assigned to an IT asset






25. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t






26. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.






27. Port 22






28. A protocol used to pass control and error messages between nodes on the Internet.






29. A file system used by the Mac OS.






30. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.






31. A backlog of packets stored in buffers and waiting to be forwarded over an interface.






32. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.






33. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).






34. Hex 12






35. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.






36. don't ping






37. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.






38. A hardware device used to log keystrokes covertly. Hardware keystroke loggers are very dangerous due to the fact that they cannot be detected through regular software/anti-malware scanning.






39. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.






40. TCP connect() scan






41. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.






42. A type of encryption where the same key is used to encrypt and decrypt the message.






43. A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information. The EDGAR database performs automated collection - validation - indexing - acceptance - and forwarding of submiss






44. A method of external testing whereby several systems or resources are used together to effect an attack.






45. A software or hardware defect that often results in system vulnerabilities.






46. A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.






47. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.






48. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.






49. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.






50. Port 31337