Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A software or hardware application or device that captures user keystrokes.






2. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.






3. A virus designed to infect the master boot record.






4. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






5. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o






6. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main






7. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.






8. Nmap normal output






9. A method of external testing whereby several systems or resources are used together to effect an attack.






10. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.






11. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






12. A social-engineering attack that manipulates the victim into calling the attacker for help.






13. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.






14. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.






15. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.






16. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can






17. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.






18. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.






19. ICMP Type/Code 3






20. A method of defining what rights and permissions an entity has to a given resource. In networking - Access Control Lists are commonly associated with firewall and router traffic filtering rules.






21. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.






22. A social-engineering attack using computer resources - such as e-mail or IRC.






23. The process of systematically testing each port on a firewall to map rules and determine accessible ports.






24. Cracking Tools






25. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.






26. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.






27. Hex 14






28. nmap






29. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.






30. Controls to detect anomalies or undesirable events occurring on a system.






31. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par






32. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.






33. Paranoid scan timing






34. A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator - or similar level.






35. White hat






36. The condition of a resource being ready for use and accessible by authorized users.






37. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur






38. Ping Scan






39. An unknown deficiency in software or some other product that results in a security vulnerability being identified.






40. The process of determining if a network entity (user or service) is legitimate






41. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.






42. The act or actions of a hacker to put forward a cause or a political agenda - to affect some societal change - or to shed light on something he feels to be political injustice. These activities are usually illegal in nature.






43. TCP connect() scan






44. TCP Ping






45. A person or entity indirectly involved in a relationship between two principles.






46. Network Scanning






47. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.






48. A section or subset of the network. Often a router or other routing device provides the end point of the segment.






49. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.






50. Shifting responsibility from one party to another







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests