Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.






2. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U






3. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.






4. A command that instructs the system processor to do nothing. Many overflow attacks involve stringing several NOP operations together (known as a NOP sled).






5. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).






6. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination






7. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.






8. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.






9. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.






10. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.






11. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.






12. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.






13. ACK Scan






14. Port 161/162






15. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.






16. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat






17. A host designed to collect data on suspicious activity.






18. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.






19. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr






20. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.






21. Port 135






22. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur






23. Another term for firewalking






24. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.






25. A section or subset of the network. Often a router or other routing device provides the end point of the segment.






26. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.






27. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.






28. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.






29. Method used by antivirus software to detect new - unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program - looking for a sequence or sequences of instructions that differentiate the virus from 'normal' p






30. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.






31. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.






32. A series of documents and notes on standards used or proposed for use on the Internet; each is identified by a number.






33. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.






34. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.






35. Port 53






36. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.






37. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.






38. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.






39. don't ping






40. An Application layer protocol for managing devices on an IP network.






41. A computer virus that infects and spreads in multiple ways.






42. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio






43. Incremental Substitution






44. An attack that combines a brute-force attack with a dictionary attack.






45. Establish Null Session






46. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.






47. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa






48. Hex 29






49. A type of malware that covertly collects information about a user.






50. nmap







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests