Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.






2. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).






3. Hashing algorithm that results in a 128-bit output.






4. Polite scan timing






5. FIN Scan






6. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.






7. A command that instructs the system processor to do nothing. Many overflow attacks involve stringing several NOP operations together (known as a NOP sled).






8. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.






9. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.






10. Hex 29






11. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.






12. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.






13. Evaluation in which testers attempt to penetrate the network.






14. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






15. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






16. The level of importance assigned to an IT asset






17. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.






18. Using conversation or some other interaction between people to gather useful information.






19. List Scan






20. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






21. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.






22. A device providing temporary - on-demand - point-to-point network access to users.






23. A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.






24. A method of external testing whereby several systems or resources are used together to effect an attack.






25. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.






26. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.






27. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.






28. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.






29. ICMP Type/Code 11






30. A storage buffer that transparently stores data so future requests for the same data can be served faster.






31. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP






32. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.






33. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator






34. TCP Ping






35. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.






36. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.






37. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






38. TCP SYN Scan






39. ICMP Type/Code 3-13






40. A type of encryption where the same key is used to encrypt and decrypt the message.






41. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.






42. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.






43. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.






44. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.






45. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.






46. A string that represents the location of a web resource






47. A backlog of packets stored in buffers and waiting to be forwarded over an interface.






48. Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality - integrity - or availability of an information system. A virus - worm - Trojan horse - or other code-based entity that infects a






49. An evaluation conducted to determine the potential for damage to or loss of an IT asset.






50. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.