Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.






2. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.






3. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.






4. Occurs when authorized users accumulate excess privileges on a system due to moving from position to position.






5. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi






6. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.






7. PI and PT Ping






8. A communications path - such as the Internet - authorized for data transmission within a computer system or network.






9. ICMP Ping






10. A Windows-based GUI version of nmap.






11. A section or subset of the network. Often a router or other routing device provides the end point of the segment.






12. Injecting traffic into the network to identify the operating system of a device.






13. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.






14. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.






15. The act of dialing all numbers within an organization to discover open modems.






16. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.






17. Two or more LANs connected by a high-speed line across a large geographical area.






18. Vulnerability Scanning






19. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.






20. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.






21. Evaluation in which testers attempt to penetrate the network.






22. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.






23. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.






24. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.






25. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






26. Ports 20/21






27. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)






28. Hex 10






29. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.






30. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.






31. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.






32. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.






33. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.






34. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.






35. A portion of memory used to temporarily store output or input data.






36. A principle in security engineering that attempts to use anonymity and secrecy (of design - implementation - and so on) to provide security; the footprint of the organization - entity - network - or system is kept as small as possible to avoid intere






37. Polymorphic Virus






38. 18 U.S.C. 1030






39. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.






40. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.






41. nmap all output






42. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.






43. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a






44. The process of using easily accessible DNS records to map a target network's internal hosts.






45. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.






46. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.






47. A protocol used to pass control and error messages between nodes on the Internet.






48. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






49. A denial-of-service technique that uses numerous hosts to perform the attack.






50. A string that represents the location of a web resource