Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.






2. Malware designed to install some sort of virus - backdoor - and so on - on a target system.






3. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.






4. LM Hash for short passwords (under 7)






5. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.






6. A documented process for a procedure designed to be consistent - repeatable - and accountable.






7. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.






8. Nmap ml output






9. A virus designed to infect the master boot record.






10. 18 U.S.C. 1030






11. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.






12. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).






13. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.






14. A hardware device used to log keystrokes covertly. Hardware keystroke loggers are very dangerous due to the fact that they cannot be detected through regular software/anti-malware scanning.






15. Polymorphic Virus






16. Insane scan timing






17. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.






18. A wireless networking mode where all clients connect to the wireless network through a central access point.






19. The software product or system that is the subject of an evaluation.






20. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.






21. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.






22. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.






23. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo






24. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the






25. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.






26. Hex 14






27. Port 135






28. A protocol defining packets that are able to be routed by a router.






29. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.






30. A nontechnical method of hacking. Social engineering is the art of manipulating people - whether in person (human-based) or via computing methods (computer-based) - into providing sensitive information.






31. UDP Scan






32. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.






33. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.






34. ICMP Netmask






35. Sneaky scan timing






36. A command that instructs the system processor to do nothing. Many overflow attacks involve stringing several NOP operations together (known as a NOP sled).






37. Transmitting one protocol encapsulated inside another protocol.






38. The default network authentication suite of protocols for Windows NT 4.0






39. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.






40. A string used for authentication in SNMP. The public community string is used for read-only searches - whereas the private community string is used for read/write. Community strings are transmitted in clear text in SNMPv1. SNMPv3 provides encryption






41. Port 53






42. Computer software or hardware that can intercept and log traffic passing over a digital network.






43. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.






44. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.






45. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi






46. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.






47. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.






48. A protocol that allows a client computer to request services from a server and the server to return the results.






49. The conveying of official access or legal power to a person or entity.






50. An organized collection of data.