Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.






2. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.






3. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption






4. Hex 10






5. Phases of an attack






6. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman






7. A point of reference used to mark an initial state in order to manage change.






8. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are






9. A computer network confined to a relatively small area - such as a single building or campus.






10. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.






11. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.






12. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.






13. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.






14. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.






15. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive






16. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.






17. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.






18. Sneaky scan timing






19. The exploitation of a security vulnerability






20. A protocol for exchanging packets over a serial line.






21. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.






22. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.






23. Window Scan






24. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.






25. In penetration testing - enumeration is the act of querying a device or network segment thoroughly and systematically for information.






26. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.






27. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.






28. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.






29. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.






30. A virus written in a macro language and usually embedded in document or spreadsheet files.






31. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi






32. The lack of clocking (imposed time ordering) on a bit stream.






33. A record showing which user has accessed a given resource and what operations the user performed during a given period.






34. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks






35. A virus that plants itself in a system's boot sector and infects the master boot record.






36. A command used in HTTP and FTP to retrieve a file from a server.






37. Directory Transversal






38. Any circumstance or event with the potential to adversely impact organizationaloperations - organizational assets - or individuals through an information system via unauthorized access - destruction - disclosure - modification of information - and/or






39. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.






40. Black box test






41. The act of dialing all numbers within an organization to discover open modems.






42. Another term for firewalking






43. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.






44. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.






45. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






46. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.






47. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.






48. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.






49. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.






50. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.