Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -






2. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.






3. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.






4. Activities to determine the extent to which a security control is implemented correctly - operating as intended - and producing the desired outcome with respect to meeting the security requirements for the system.






5. Xmas Tree scan






6. The conveying of official access or legal power to a person or entity.






7. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.






8. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.






9. Paranoid scan timing






10. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.






11. Any item of value or worth to an organization - whether physical or virtual.






12. IP Protocol Scan






13. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.






14. NSA






15. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points






16. A computer virus that infects and spreads in multiple ways.






17. A data encryption/decryption program often used for e-mail and file storage.






18. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.






19. Wrapper or Binder






20. The lack of clocking (imposed time ordering) on a bit stream.






21. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi






22. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.






23. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.






24. Two or more LANs connected by a high-speed line across a large geographical area.






25. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.






26. A computer placed outside a firewall to provide public services to other Internet sites - and hardened to resist external attacks.






27. 18 U.S.C. 1030






28. Recording the time - normally in a log file - when an event happens or when information is created or modified.






29. A unique hostname that is used to identify resources on the Internet. Domain names start with a root (.) - then add a top level (.com - .gov - or .mil - for example) - and a given name space.






30. List Scan






31. A documented process for a procedure designed to be consistent - repeatable - and accountable.






32. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U






33. An adapter that provides the physical connection to send and receive data between the computer and the network media.






34. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.






35. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely






36. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.






37. The process of determining if a network entity (user or service) is legitimate






38. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private






39. don't ping






40. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.






41. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.






42. Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or eight-digit hexadecimal number.






43. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.






44. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c






45. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori






46. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.






47. Defined in RFC 826 - ARP is a protocol used to map a known IP address to a physical (MAC) address.






48. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr






49. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a






50. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc