Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.






2. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).






3. A Canonical Name record within DNS - used to provide an alias for a domain name.






4. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr






5. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.






6. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.






7. Polymorphic Virus






8. A file system used by the Mac OS.






9. A device on a network.






10. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.






11. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.






12. Controls to detect anomalies or undesirable events occurring on a system.






13. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.






14. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.






15. ACK Scan






16. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






17. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.






18. LM Hash for short passwords (under 7)






19. ICMP Type/Code 0-0






20. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -






21. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.






22. A communications protocol used for browsing the Internet.






23. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.






24. An attack that combines a brute-force attack with a dictionary attack.






25. NSA






26. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.






27. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.






28. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.






29. Recording the time - normally in a log file - when an event happens or when information is created or modified.






30. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.






31. A business - government agency - or educational institution that provides access to the Internet.






32. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.






33. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.






34. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.






35. Describes practices in production and development that promote access to the end product's source materials.






36. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the






37. Cracking Tools






38. List Scan






39. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi






40. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).






41. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.






42. Network Scanning






43. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.






44. Port 161/162






45. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.






46. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.






47. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.






48. The transmission of digital signals without precise clocking or synchronization.






49. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






50. Black hat