Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A social-engineering attack that manipulates the victim into calling the attacker for help.






2. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U






3. Port 137/138/139






4. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP






5. Hashing algorithm that results in a 128-bit output.






6. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.






7. The contents of a packet. A system attack requires the attacker to deliver a malicious payload that is acted upon and executed by the system.






8. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie






9. A computer process that requests a service from another computer and accepts the server's responses.






10. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.






11. A protocol for exchanging packets over a serial line.






12. An adapter that provides the physical connection to send and receive data between the computer and the network media.






13. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.






14. A type of malware that covertly collects information about a user.






15. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






16. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.






17. TCP Ping






18. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.






19. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.






20. A virus that plants itself in a system's boot sector and infects the master boot record.






21. The act of secretly listening to the private conversations of others without their consent. This can also be done over telephone lines (wiretapping) - e-mail - instant messaging - and other methods of communication considered private






22. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.






23. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.






24. A protocol that allows a client computer to request services from a server and the server to return the results.






25. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.






26. A series of documents and notes on standards used or proposed for use on the Internet; each is identified by a number.






27. Port Scanning

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


28. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main






29. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.






30. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.






31. A device or service designed to obfuscate traffic between a client and the Internet. Generally used to make activity on the Internet as untraceable as possible.






32. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.






33. A device on a network.






34. A protocol used for sending and receiving log information for nodes on a network.






35. ex 02






36. Establish Null Session






37. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat






38. Port 389






39. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).






40. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.






41. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.






42. nmap all output






43. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely






44. A wireless networking mode where all clients connect to the wireless network through a central access point.






45. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.






46. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.






47. An unknown deficiency in software or some other product that results in a security vulnerability being identified.






48. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.






49. LM Hash for short passwords (under 7)






50. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests