Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.






2. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.






3. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.






4. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.






5. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.






6. A type of malware that covertly collects information about a user.






7. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.






8. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.






9. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.






10. An attack that combines a brute-force attack with a dictionary attack.






11. A command that instructs the system processor to do nothing. Many overflow attacks involve stringing several NOP operations together (known as a NOP sled).






12. A method of external testing whereby several systems or resources are used together to effect an attack.






13. Name given to expert groups that handle computer security incidents.






14. A computer process that requests a service from another computer and accepts the server's responses.






15. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.






16. A small Trojan program that listens on port 777.






17. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.






18. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.






19. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.






20. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori






21. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.






22. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.






23. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.






24. An early network application that provides information on users currently logged on to a machine.






25. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.






26. The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information






27. Incremental Substitution






28. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.






29. Policy stating what users of a system can and cannot do with the organization's assets.






30. ICMP Type/Code 3-13






31. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive






32. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.






33. FIN Scan






34. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.






35. The steps taken to gather evidence and information on the targets you wish to attack.






36. A document describing information security guidelines - policies - procedures - and standards.






37. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.






38. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.






39. FTP Bounce Attack






40. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.






41. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are






42. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.






43. Aggressive scan timing






44. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.






45. A systematic process for the assessment of security vulnerabilities.






46. A backlog of packets stored in buffers and waiting to be forwarded over an interface.






47. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.






48. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






49. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.






50. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.