Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.






2. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.






3. A social-engineering attack that manipulates the victim into calling the attacker for help.






4. NSA






5. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.






6. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.






7. nmap






8. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.






9. The default network authentication suite of protocols for Windows NT 4.0






10. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col






11. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.






12. White box test






13. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






14. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






15. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr






16. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.






17. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.






18. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.






19. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.






20. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.






21. Policy stating what users of a system can and cannot do with the organization's assets.






22. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.






23. A type of encryption where the same key is used to encrypt and decrypt the message.






24. Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.






25. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.






26. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.






27. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response






28. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.






29. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.






30. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.






31. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.






32. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p






33. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).






34. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o






35. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the






36. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.






37. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.






38. A host designed to collect data on suspicious activity.






39. RPC Scan






40. The transmission of digital signals without precise clocking or synchronization.






41. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t






42. A communications protocol used for browsing the Internet.






43. The process of systematically testing each port on a firewall to map rules and determine accessible ports.






44. List Scan






45. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.






46. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par






47. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.






48. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.






49. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.






50. An Application layer protocol for sending electronic mail between servers.