Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Wrapper or Binder






2. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat






3. ICMP Ping






4. Cracking Tools






5. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can






6. Incremental Substitution






7. Port 88






8. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.






9. A method of password cracking whereby all possible options are systematically enumerated until a match is found. These attacks try every password (or authentication option) - one after another - until successful. Bruteforce attacks take a long time t






10. In computer security - this is an algorithm that uses separate keys for encryption and decryption.






11. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).






12. Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or eight-digit hexadecimal number.






13. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra






14. A method of external testing whereby several systems or resources are used together to effect an attack.






15. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.






16. Vulnerability Scanning






17. PI and PT Ping






18. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.






19. Ports 20/21






20. A device that provides access between two or more networks. Gateways are typically used to connect dissimilar networks.






21. A small Trojan program that listens on port 777.






22. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.






23. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and protective measu






24. White box test






25. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.






26. NSA






27. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.






28. An attack that exploits the common mistake many people make when installing operating systems






29. A program or piece of code inserted into a system - usually covertly - with the intent of compromising the confidentiality - integrity - or availability of the victim's data - applications - or operating system. Malware consists of viruses - worms -






30. Transmitting one protocol encapsulated inside another protocol.






31. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U






32. 18 U.S.C. 1029






33. ICMP Type/Code 8






34. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.






35. Independent review and examination of records and activities to assess the adequacy of system controls - to ensure compliance with established policies and operational procedures - and to recommend necessary changes.






36. A network traffic management technique designed to allow applications to specify the route a packet will take to a destination - regardless of what the route tables between the two systems say.






37. A group of people - gathered together by a business entity - working to address a specific problem or goal.






38. Recording the time - normally in a log file - when an event happens or when information is created or modified.






39. Ping Scan






40. Sneaky scan timing






41. An informed decision to accept the potential for damage to or loss of an IT asset.






42. 18 U.S.C. 1030






43. A routing protocol developed to be used within a single organization.






44. The process of systematically testing each port on a firewall to map rules and determine accessible ports.






45. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g






46. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr






47. TCP Ping






48. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.






49. A mathematical operation requiring two binary inputs: If the inputs match - the output is a 0 - otherwise it is a 1.






50. ICMP Type/Code 3







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests