Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Using conversation or some other interaction between people to gather useful information.






2. Recording the time - normally in a log file - when an event happens or when information is created or modified.






3. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.






4. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.






5. A documented process for a procedure designed to be consistent - repeatable - and accountable.






6. Port 135






7. A group of people - gathered together by a business entity - working to address a specific problem or goal.






8. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.






9. The change or growth of a project's scope






10. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private






11. List Scan






12. An organized collection of data.






13. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.






14. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).






15. Attacks on the actual programming code of an application.






16. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat






17. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.






18. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.






19. ICMP Type/Code 3






20. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a






21. A document describing information security guidelines - policies - procedures - and standards.






22. NSA






23. A data encryption/decryption program often used for e-mail and file storage.






24. A type of malware that covertly collects information about a user.






25. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.






26. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.






27. Paranoid scan timing






28. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are






29. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.






30. An Application layer protocol for managing devices on an IP network.






31. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.






32. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.






33. Access by information systems (or users) communicating from outside the information system security perimeter.






34. A protocol defining packets that are able to be routed by a router.






35. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.






36. A communications protocol used for browsing the Internet.






37. Microsoft SID 500






38. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.






39. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the






40. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.






41. The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information






42. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.






43. Port 23






44. The art and science of creating a covert message or image within another message - image - audio - or video file.






45. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.






46. Security identifier. The method by which Windows identifies user - group - and computer accounts for rights and permissions.






47. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.






48. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.






49. Any item of value or worth to an organization - whether physical or virtual.






50. Incremental Substitution