Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. White hat






2. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.






3. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.






4. ACK Scan






5. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.






6. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa






7. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.






8. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio






9. An adapter that provides the physical connection to send and receive data between the computer and the network media.






10. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.






11. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.






12. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.






13. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use






14. A list of IP addresses and corresponding MAC addresses stored on a local computer.






15. The concept of having more than one person required to complete a task






16. nmap






17. A method of external testing whereby several systems or resources are used together to effect an attack.






18. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator






19. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.






20. 18 U.S.C. 1030






21. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.






22. Any item of value or worth to an organization - whether physical or virtual.






23. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.






24. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.






25. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






26. The potential for damage to or loss of an IT asset






27. A point of reference used to mark an initial state in order to manage change.






28. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.






29. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio






30. A social-engineering attack using computer resources - such as e-mail or IRC.






31. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.






32. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.






33. A program designed to execute at a specific time to release malicious code onto the computer system or network.






34. Port 22






35. A protocol used to pass control and error messages between nodes on the Internet.






36. A virus written in a macro language and usually embedded in document or spreadsheet files.






37. A free and popular version of the Unix operating system.






38. Two or more LANs connected by a high-speed line across a large geographical area.






39. nmap






40. A string that represents the location of a web resource






41. An early network application that provides information on users currently logged on to a machine.






42. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.






43. A communications protocol used for browsing the Internet.






44. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.






45. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.






46. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.






47. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.






48. An attack that exploits the common mistake many people make when installing operating systems






49. Nmap normal output






50. Port 110