Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.






2. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p






3. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.






4. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.






5. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.






6. A tool that helps a company to compare its actual performance with its potential performance.






7. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)






8. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.






9. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.






10. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.






11. 18 U.S.C. 1030






12. A portion of memory used to temporarily store output or input data.






13. RPC Scan






14. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.






15. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.






16. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.






17. The last portion of the SID that identifies the user to the system in Windows. A RID of 500 identifies the administrator account.






18. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.






19. The steps taken to gather evidence and information on the targets you wish to attack.






20. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur






21. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all






22. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).






23. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc






24. A device providing temporary - on-demand - point-to-point network access to users.






25. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.






26. A file system used by the Mac OS.






27. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.






28. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio






29. The potential for damage to or loss of an IT asset






30. Describes practices in production and development that promote access to the end product's source materials.






31. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.






32. A person or entity indirectly involved in a relationship between two principles.






33. A host designed to collect data on suspicious activity.






34. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.






35. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.






36. The condition of a resource being ready for use and accessible by authorized users.






37. Port 22






38. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par






39. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can






40. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.






41. Hex 12






42. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.






43. An Internet routing protocol used to exchange routing information within an autonomous system.






44. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.






45. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP






46. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive






47. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






48. Phases of an attack






49. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door






50. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio