Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A group of experts that handles computer security incidents.






2. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c






3. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.






4. An unknown deficiency in software or some other product that results in a security vulnerability being identified.






5. Malware designed to install some sort of virus - backdoor - and so on - on a target system.






6. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.






7. A computer process that requests a service from another computer and accepts the server's responses.






8. Two or more LANs connected by a high-speed line across a large geographical area.






9. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.






10. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.






11. Phases of an attack






12. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.






13. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.






14. Port 161/162






15. A configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just frames addressed to it






16. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.






17. Idlescan






18. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.






19. A program designed to execute at a specific time to release malicious code onto the computer system or network.






20. A one-way mathematical function that generates a fixedlength numerical string (hash) from a given data input. MD5 and SHA-1 are hashing algorithms.






21. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.






22. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.






23. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.






24. nmap






25. MAC Flooding






26. The default network authentication suite of protocols for Windows NT 4.0






27. NSA






28. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.






29. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.






30. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.






31. The transmission of digital signals without precise clocking or synchronization.






32. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.






33. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.






34. Port 88






35. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.






36. A defined measure of service within a network system






37. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the






38. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity






39. Policy stating what users of a system can and cannot do with the organization's assets.






40. The basis of this kind of security is that an individual user - or program operating on the user's behalf - is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the use






41. Computer software or hardware that can intercept and log traffic passing over a digital network.






42. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.






43. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.






44. A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.






45. PI and PT Ping






46. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can






47. Security identifier. The method by which Windows identifies user - group - and computer accounts for rights and permissions.






48. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.






49. The condition of a resource being ready for use and accessible by authorized users.






50. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.