Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.






2. Hex 12






3. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.






4. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.






5. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.






6. A software or hardware defect that often results in system vulnerabilities.






7. The process of using easily accessible DNS records to map a target network's internal hosts.






8. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).






9. Port 53






10. A business - government agency - or educational institution that provides access to the Internet.






11. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p






12. Part of a service contract where the level of service is formally defined; may be required as part of the initial pen test agreements.






13. Nmap normal output






14. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.






15. Another term for firewalking






16. A computer network confined to a relatively small area - such as a single building or campus.






17. A software or hardware application or device that captures user keystrokes.






18. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.






19. A mode of operation in a wireless LAN in which clients send data directly to one another without utilizing a wireless access point (WAP) - much like a point-to-point wired connection.






20. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets






21. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.






22. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main






23. The change or growth of a project's scope






24. Hex 04






25. Policy stating what users of a system can and cannot do with the organization's assets.






26. Hashing algorithm that results in a 128-bit output.






27. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.






28. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action






29. A defined measure of service within a network system






30. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o






31. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.






32. Two or more LANs connected by a high-speed line across a large geographical area.






33. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.






34. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.






35. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.






36. A social-engineering effort in which the attacker pretends to be an employee - a valid user - or even an executive to elicit information or access.






37. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.






38. A command used in HTTP and FTP to retrieve a file from a server.






39. The potential for damage to or loss of an IT asset






40. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio






41. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.






42. Xmas Tree scan






43. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)






44. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






45. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.






46. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi






47. The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information






48. CAN-SPAM






49. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.






50. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo