Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A tool that helps a company to compare its actual performance with its potential performance.






2. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.






3. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.






4. The art and science of creating a covert message or image within another message - image - audio - or video file.






5. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.






6. A program designed to execute at a specific time to release malicious code onto the computer system or network.






7. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p






8. The act or actions of a hacker to put forward a cause or a political agenda - to affect some societal change - or to shed light on something he feels to be political injustice. These activities are usually illegal in nature.






9. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.






10. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.






11. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely






12. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.






13. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.






14. White hat






15. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.






16. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.






17. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.






18. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.






19. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






20. TCP Ping






21. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.






22. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa






23. A person or entity indirectly involved in a relationship between two principles.






24. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.






25. Microsoft SID 500






26. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.






27. Nmap grepable output






28. A structured set of criteria for evaluating computer security within products and systems produced by European countries; it has been largely replaced by the Common Criteria.






29. Part of a service contract where the level of service is formally defined; may be required as part of the initial pen test agreements.






30. Monitoring of telephone or Internet conversations - typically by covert means.






31. The process of embedding information into a digital signal in a way that makes it difficult to remove.






32. A business - government agency - or educational institution that provides access to the Internet.






33. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.






34. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can






35. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.






36. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response






37. FTP Bounce Attack






38. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).






39. Phases of an attack






40. The process of systematically testing each port on a firewall to map rules and determine accessible ports.






41. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).






42. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks






43. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).






44. A protocol used for sending and receiving log information for nodes on a network.






45. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).






46. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.






47. ACK Scan






48. Process of breaking a packet into smaller units when it is being transmitted over a network medium that's unable to support a transmission unit the original size of the packet.






49. ICMP Timestamp






50. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.