Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A list of IP addresses and corresponding MAC addresses stored on a local computer.






2. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.






3. Any item of value or worth to an organization - whether physical or virtual.






4. The concept of having more than one person required to complete a task






5. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP






6. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.






7. A standard developed to enable routers to exchange messages containing information about routes to reach subnets in the network.






8. An agreement between the penetration tester and the client detailing the activities the tester is permitted to perform.






9. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi






10. A protocol used to pass control and error messages between nodes on the Internet.






11. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main






12. An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier - but does not alter the data (in other words - eavesdropping).






13. The level of importance assigned to an IT asset






14. A group of experts that handles computer security incidents.






15. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.






16. Port 22






17. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.






18. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.






19. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.






20. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.






21. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.






22. Insane scan timing






23. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely






24. Cracking Tools






25. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.






26. The steps taken to gather evidence and information on the targets you wish to attack.






27. A documented process for a procedure designed to be consistent - repeatable - and accountable.






28. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can






29. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.






30. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.






31. White hat






32. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.






33. Directory Transversal






34. ICMP Netmask






35. RPC Scan






36. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action






37. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.






38. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.






39. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.






40. The condition of a resource being ready for use and accessible by authorized users.






41. A software or hardware application or device that captures user keystrokes.






42. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door






43. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.






44. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.






45. The process of determining if a network entity (user or service) is legitimate






46. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.






47. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.






48. A small Trojan program that listens on port 777.






49. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the






50. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests