Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.






2. The monetary value assigned to an IT asset.






3. The potential for damage to or loss of an IT asset






4. A social-engineering attack that manipulates the victim into calling the attacker for help.






5. The Security Accounts Manager file in Windows stores all the password hashes for the system.






6. Name given to expert groups that handle computer security incidents.






7. A computer network confined to a relatively small area - such as a single building or campus.






8. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.






9. Shifting responsibility from one party to another






10. A computer virus that infects and spreads in multiple ways.






11. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.






12. Process of breaking a packet into smaller units when it is being transmitted over a network medium that's unable to support a transmission unit the original size of the packet.






13. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.






14. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.






15. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.






16. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.






17. Black box test






18. The change or growth of a project's scope






19. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action






20. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.






21. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.






22. A small Trojan program that listens on port 777.






23. The combination of all IT assets - resources - components - and systems.






24. Xmas Tree scan






25. Port 137/138/139






26. Port 80/81/8080






27. The act of checking some sequence of tokens for the presence of the constituents of some pattern.






28. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.






29. Controls to detect anomalies or undesirable events occurring on a system.






30. ICMP Type/Code 3






31. An evaluation conducted to determine the potential for damage to or loss of an IT asset.






32. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.






33. A string that represents the location of a web resource






34. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.






35. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.






36. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.






37. Wrapper or Binder






38. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






39. UDP Scan






40. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat






41. Version Detection Scan






42. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO






43. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.






44. ICMP Type/Code 8






45. ICMP Type/Code 11






46. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.






47. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.






48. List Scan






49. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.






50. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -