Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.






2. The act of checking some sequence of tokens for the presence of the constituents of some pattern.






3. A defined measure of service within a network system






4. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).






5. Port 135






6. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.






7. A string that represents the location of a web resource






8. A person or entity indirectly involved in a relationship between two principles.






9. The default network authentication suite of protocols for Windows NT 4.0






10. CAN-SPAM






11. Cracking Tools






12. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.






13. A software or hardware application or device that captures user keystrokes.






14. Aggressive scan timing






15. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat






16. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col






17. Xmas Tree scan






18. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.






19. A record showing which user has accessed a given resource and what operations the user performed during a given period.






20. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.






21. Access by information systems (or users) communicating from outside the information system security perimeter.






22. Recording the time - normally in a log file - when an event happens or when information is created or modified.






23. A computer network confined to a relatively small area - such as a single building or campus.






24. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.






25. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.






26. A method of external testing whereby several systems or resources are used together to effect an attack.






27. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.






28. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.






29. A computer file system architecture used in Windows - OS/2 - and most memory cards.






30. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.






31. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.






32. Unauthorized access to information such as a calendar - contact list - e-mails - and text messages on a wireless device through a Bluetooth connection.






33. An Internet routing protocol used to exchange routing information within an autonomous system.






34. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.






35. NSA






36. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t






37. Nmap grepable output






38. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.






39. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.






40. A fully qualified domain name consists of a host and domain name - including a top-level domain such as .com - .net - .mil - .edu -and so on.






41. A storage buffer that transparently stores data so future requests for the same data can be served faster.






42. ex 02






43. Window Scan






44. Sneaky scan timing






45. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.






46. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.






47. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio






48. Port 88






49. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.






50. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests