Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The combination of all IT assets - resources - components - and systems.






2. Used for exchanging structured information - such as XML-based messages - in the implementation of web services






3. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use






4. A host designed to collect data on suspicious activity.






5. The ability to trace actions performed on a system to a specific user or system entity.






6. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.






7. Metamorphic Virus






8. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the






9. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.






10. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa






11. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.






12. 18 U.S.C. 1029






13. Hashing algorithm that results in a 128-bit output.






14. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.






15. IP Protocol Scan






16. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.






17. A backlog of packets stored in buffers and waiting to be forwarded over an interface.






18. A virus designed to infect the master boot record.






19. A documented process for a procedure designed to be consistent - repeatable - and accountable.






20. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)






21. A type of malware that covertly collects information about a user.






22. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive






23. List Scan






24. A program designed to execute at a specific time to release malicious code onto the computer system or network.






25. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi






26. FTP Bounce Attack






27. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.






28. nmap all output






29. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.






30. Ping Scan






31. The potential for damage to or loss of an IT asset






32. The process of recording activity on a system for monitoring and later review.






33. An adapter that provides the physical connection to send and receive data between the computer and the network media.






34. A tool that helps a company to compare its actual performance with its potential performance.






35. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu






36. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.






37. A software or hardware defect that often results in system vulnerabilities.






38. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur






39. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response






40. A virus written in a macro language and usually embedded in document or spreadsheet files.






41. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.






42. Port 135






43. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.






44. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.






45. Nmap ml output






46. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.






47. Port 110






48. Any network incident that prompts some kind of log entry or other notification.






49. Independent review and examination of records and activities to assess the adequacy of system controls - to ensure compliance with established policies and operational procedures - and to recommend necessary changes.






50. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.