Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A routing protocol developed to be used within a single organization.






2. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.






3. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.






4. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






5. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.






6. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






7. A virus that plants itself in a system's boot sector and infects the master boot record.






8. An agreement between the penetration tester and the client detailing the activities the tester is permitted to perform.






9. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.






10. A free and popular version of the Unix operating system.






11. A protocol used to pass control and error messages between nodes on the Internet.






12. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p






13. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.






14. A principle in security engineering that attempts to use anonymity and secrecy (of design - implementation - and so on) to provide security; the footprint of the organization - entity - network - or system is kept as small as possible to avoid intere






15. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.






16. Idlescan






17. Port 110






18. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)






19. The process of embedding information into a digital signal in a way that makes it difficult to remove.






20. SYN Ping






21. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.






22. A computer virus that infects and spreads in multiple ways.






23. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.






24. An Internet routing protocol used to exchange routing information within an autonomous system.






25. A social-engineering effort in which the attacker pretends to be an employee - a valid user - or even an executive to elicit information or access.






26. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio






27. A record showing which user has accessed a given resource and what operations the user performed during a given period.






28. A method of external testing whereby several systems or resources are used together to effect an attack.






29. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.






30. A type of malware that covertly collects information about a user.






31. A defined measure of service within a network system






32. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.






33. Malware designed to install some sort of virus - backdoor - and so on - on a target system.






34. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.






35. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.






36. A group of experts that handles computer security incidents.






37. Sneaky scan timing






38. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.






39. Attacks on the actual programming code of an application.






40. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori






41. The process of recording activity on a system for monitoring and later review.






42. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.






43. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with






44. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).






45. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).






46. Nmap normal output






47. A protocol defining packets that are able to be routed by a router.






48. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.






49. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.






50. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.