Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ACK Scan






2. ICMP Ping






3. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.






4. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.






5. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).






6. A file system used by the Mac OS.






7. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.






8. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.






9. RPC Scan






10. In computer security - this is an algorithm that uses separate keys for encryption and decryption.






11. A network administration command-line tool available for many operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mappings or any other specific DNS record.






12. A section or subset of the network. Often a router or other routing device provides the end point of the segment.






13. The Security Accounts Manager file in Windows stores all the password hashes for the system.






14. Black box test






15. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.






16. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat






17. A self-replicating malicious program that attempts installation beneath antivirus software by directly intercepting the interrupt handlers of the operating system to evade detection.






18. An anonymous connection to an administrative share (IPC$) on a Windows machine. Null sessions allow for enumeration of Windows machines - among other attacks.






19. 18 U.S.C. 1030






20. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie






21. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.






22. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.






23. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.






24. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.






25. A social-engineering attack that manipulates the victim into calling the attacker for help.






26. nmap






27. A stand-alone computer - kept off the network - that is used for scanning potentially malicious media or software.






28. nmap all output






29. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.






30. Independent review and examination of records and activities to assess the adequacy of system controls - to ensure compliance with established policies and operational procedures - and to recommend necessary changes.






31. 18 U.S.C. 1029






32. IP Protocol Scan






33. A backlog of packets stored in buffers and waiting to be forwarded over an interface.






34. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator






35. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.






36. Transmitting one protocol encapsulated inside another protocol.






37. Normal scan timing






38. TCP connect() scan






39. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).






40. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.






41. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.






42. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.






43. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.






44. FTP Bounce Attack






45. Xmas Tree scan






46. The concept of having more than one person required to complete a task






47. Name given to expert groups that handle computer security incidents.






48. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.






49. An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.






50. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)