Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.






2. Port Scanning

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


3. Using conversation or some other interaction between people to gather useful information.






4. A protocol for exchanging packets over a serial line.






5. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public






6. The potential for damage to or loss of an IT asset






7. Name given to expert groups that handle computer security incidents.






8. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.






9. A section or subset of the network. Often a router or other routing device provides the end point of the segment.






10. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.






11. Any item of value or worth to an organization - whether physical or virtual.






12. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.






13. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.






14. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.






15. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.






16. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.






17. A Canonical Name record within DNS - used to provide an alias for a domain name.






18. A device on a network.






19. FIN Scan






20. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.






21. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.






22. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.






23. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.






24. Black box test






25. Port 135






26. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.






27. An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.






28. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.






29. Injecting traffic into the network to identify the operating system of a device.






30. Port 389






31. A software or hardware defect that often results in system vulnerabilities.






32. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.






33. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.






34. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.






35. A systematic process for the assessment of security vulnerabilities.






36. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.






37. Paranoid scan timing






38. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption






39. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.






40. A tool that helps a company to compare its actual performance with its potential performance.






41. The exploitation of a security vulnerability






42. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.






43. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.






44. Security identifier. The method by which Windows identifies user - group - and computer accounts for rights and permissions.






45. A string that represents the location of a web resource






46. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






47. A computer network confined to a relatively small area - such as a single building or campus.






48. IP Protocol Scan






49. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.






50. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests