Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A tool that helps a company to compare its actual performance with its potential performance.






2. A data encryption/decryption program often used for e-mail and file storage.






3. A protocol defining packets that are able to be routed by a router.






4. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.






5. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.






6. Establish Null Session






7. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr






8. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.






9. Management policy and procedures designed to maintain or restore business operations - including computer operations - possibly at an alternate location - in the event of emergencies - system failures - or disaster.






10. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.






11. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all






12. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.






13. An Application layer protocol for sending electronic mail between servers.






14. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.






15. A series of documents and notes on standards used or proposed for use on the Internet; each is identified by a number.






16. A person or entity indirectly involved in a relationship between two principles.






17. A group of people - gathered together by a business entity - working to address a specific problem or goal.






18. Hex 29






19. In computer security - this is an algorithm that uses separate keys for encryption and decryption.






20. The monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as single loss expectancy (SLE) = asset value (AV)






21. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.






22. A storage buffer that transparently stores data so future requests for the same data can be served faster.






23. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory






24. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).






25. Window Scan






26. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.






27. The act or actions of a hacker to put forward a cause or a political agenda - to affect some societal change - or to shed light on something he feels to be political injustice. These activities are usually illegal in nature.






28. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o






29. An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.






30. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.






31. Nmap normal output






32. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.






33. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.






34. The art and science of creating a covert message or image within another message - image - audio - or video file.






35. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely






36. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.






37. Phases of an attack






38. Port 80/81/8080






39. Idlescan






40. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.






41. A backlog of packets stored in buffers and waiting to be forwarded over an interface.






42. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).






43. 18 U.S.C. 1030






44. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie






45. ICMP Type/Code 11






46. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.






47. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.






48. PI and PT Ping






49. UDP Scan






50. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.