Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.






2. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).






3. TCP SYN Scan






4. Security identifier. The method by which Windows identifies user - group - and computer accounts for rights and permissions.






5. An attack that exploits the common mistake many people make when installing operating systems






6. The lack of clocking (imposed time ordering) on a bit stream.






7. Recording the time - normally in a log file - when an event happens or when information is created or modified.






8. A group of experts that handles computer security incidents.






9. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.






10. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.






11. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.






12. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.






13. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio






14. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private






15. Hex 29






16. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.






17. The conveying of official access or legal power to a person or entity.






18. Looking over an authorized user's shoulder in order to steal information (such as authentication information).






19. A mode of operation in a wireless LAN in which clients send data directly to one another without utilizing a wireless access point (WAP) - much like a point-to-point wired connection.






20. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.






21. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.






22. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.






23. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.






24. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).






25. A structured set of criteria for evaluating computer security within products and systems produced by European countries; it has been largely replaced by the Common Criteria.






26. The art and science of creating a covert message or image within another message - image - audio - or video file.






27. nmap






28. A type of DNS transfer - where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).






29. A protocol that allows a client computer to request services from a server and the server to return the results.






30. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.






31. A software or hardware application or device that captures user keystrokes.






32. Two or more LANs connected by a high-speed line across a large geographical area.






33. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu






34. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.






35. Network Scanning






36. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.






37. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door






38. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.






39. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.






40. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.






41. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.






42. A systematic process for the assessment of security vulnerabilities.






43. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.






44. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption






45. Window Scan






46. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.






47. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.






48. Any item of value or worth to an organization - whether physical or virtual.






49. Evaluation in which testers attempt to penetrate the network.






50. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.