Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a






2. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.






3. The process of embedding information into a digital signal in a way that makes it difficult to remove.






4. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.






5. ICMP Timestamp






6. Occurs when authorized users accumulate excess privileges on a system due to moving from position to position.






7. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.






8. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can






9. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.






10. Ports 20/21






11. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.






12. Malware designed to install some sort of virus - backdoor - and so on - on a target system.






13. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.






14. Literally - 'not balanced or the same.' In computing - asymmetric refers to a difference in networking speeds upstream to downstream. In cryptography - it's the use of more than one key for encryption/authentication purposes.






15. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.






16. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.






17. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action






18. A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.






19. Aggressive scan timing






20. Evaluation in which testers attempt to penetrate the network.






21. Port 161/162






22. Directing a protocol from one port to another.






23. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.






24. don't ping






25. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.






26. 18 U.S.C. 1029






27. Black box test






28. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator






29. ICMP Type/Code 3






30. The Security Accounts Manager file in Windows stores all the password hashes for the system.






31. A nonnumerical - subjective risk evaluation. Used with qualitative assessment (an evaluation of risk that results in ratings of none - low - medium - and high for the probability.)






32. A social-engineering attack using computer resources - such as e-mail or IRC.






33. 18 U.S.C. 1030






34. Phases of an attack






35. Port 80/81/8080






36. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu






37. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.






38. ICMP Type/Code 11






39. IP Protocol Scan






40. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public






41. A software or hardware application or device that captures user keystrokes.






42. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur






43. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.






44. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all






45. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).






46. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio






47. A record showing which user has accessed a given resource and what operations the user performed during a given period.






48. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.






49. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo






50. The process of using easily accessible DNS records to map a target network's internal hosts.