Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.






2. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are






3. A device providing temporary - on-demand - point-to-point network access to users.






4. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.






5. 18 U.S.C. 1030






6. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.






7. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.






8. A computer file system architecture used in Windows - OS/2 - and most memory cards.






9. Controls to detect anomalies or undesirable events occurring on a system.






10. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.






11. A protocol used to pass control and error messages between nodes on the Internet.






12. A protocol used for sending and receiving log information for nodes on a network.






13. An unknown deficiency in software or some other product that results in a security vulnerability being identified.






14. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption






15. An informed decision to accept the potential for damage to or loss of an IT asset.






16. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.






17. A protocol defining packets that are able to be routed by a router.






18. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.






19. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.






20. Access by information systems (or users) communicating from outside the information system security perimeter.






21. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.






22. Security identifier. The method by which Windows identifies user - group - and computer accounts for rights and permissions.






23. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.






24. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.






25. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.






26. A social-engineering attack using computer resources - such as e-mail or IRC.






27. Network Scanning






28. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.






29. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.






30. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.






31. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.






32. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.






33. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.






34. A person or entity indirectly involved in a relationship between two principles.






35. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.






36. A storage buffer that transparently stores data so future requests for the same data can be served faster.






37. A structured set of criteria for evaluating computer security within products and systems produced by European countries; it has been largely replaced by the Common Criteria.






38. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.






39. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.






40. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa






41. UDP Scan






42. A host designed to collect data on suspicious activity.






43. Monitoring of telephone or Internet conversations - typically by covert means.






44. Polite scan timing






45. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.






46. A communications protocol used for browsing the Internet.






47. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.






48. Computer software or hardware that can intercept and log traffic passing over a digital network.






49. A virus designed to infect the master boot record.






50. The process of determining if a network entity (user or service) is legitimate