Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A computer network confined to a relatively small area - such as a single building or campus.






2. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr






3. A social-engineering attack using computer resources - such as e-mail or IRC.






4. A person or entity indirectly involved in a relationship between two principles.






5. Directing a protocol from one port to another.






6. The ability to trace actions performed on a system to a specific user or system entity.






7. CAN-SPAM






8. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman






9. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.






10. The security property that data is not modified in an unauthorized and undetected manner. Also - the principle and measures taken to ensure that data received is in the exact same condition and state as when it was originally transmitted.






11. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.






12. Idlescan






13. A denial-of-service technique that uses numerous hosts to perform the attack.






14. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.






15. An adapter that provides the physical connection to send and receive data between the computer and the network media.






16. Attacks on the actual programming code of an application.






17. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.






18. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are






19. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.






20. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.






21. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).






22. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.






23. TCP connect() scan






24. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.






25. Any network incident that prompts some kind of log entry or other notification.






26. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo






27. A storage buffer that transparently stores data so future requests for the same data can be served faster.






28. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.






29. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.






30. Nmap grepable output






31. A protocol that allows a client computer to request services from a server and the server to return the results.






32. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.






33. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie






34. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.






35. FIN Scan






36. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.






37. Another term for firewalking






38. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.






39. Occurs when authorized users accumulate excess privileges on a system due to moving from position to position.






40. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.






41. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.






42. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.






43. 18 U.S.C. 1029






44. A group of experts that handles computer security incidents.






45. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.






46. A wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator - or has been created to allow a hacker to conduct a man-in-the-middle attack.






47. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)






48. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.






49. A type of malware that covertly collects information about a user.






50. ICMP Type/Code 11







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests