Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.






2. PI and PT Ping






3. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.






4. Hex 14






5. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.






6. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g






7. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.






8. ACK Scan






9. A document describing information security guidelines - policies - procedures - and standards.






10. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.






11. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi






12. The subjective - potential percentage of loss to a specific asset if a specific threat is realized. The exposure factor (EF) is a subjective value the person assessing risk must define.






13. A social-engineering attack using computer resources - such as e-mail or IRC.






14. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.






15. The Security Accounts Manager file in Windows stores all the password hashes for the system.






16. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.






17. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.






18. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.






19. A business - government agency - or educational institution that provides access to the Internet.






20. Hex 04






21. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.






22. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.






23. NSA






24. Ping Scan






25. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.






26. Port 135






27. Transmitting one protocol encapsulated inside another protocol.






28. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)






29. A method of external testing whereby several systems or resources are used together to effect an attack.






30. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption






31. In computer security - this is an algorithm that uses separate keys for encryption and decryption.






32. The potential for damage to or loss of an IT asset






33. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.






34. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public






35. Independent review and examination of records and activities to assess the adequacy of system controls - to ensure compliance with established policies and operational procedures - and to recommend necessary changes.






36. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.






37. TCP SYN Scan






38. Shifting responsibility from one party to another






39. Idlescan






40. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.






41. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.






42. An adapter that provides the physical connection to send and receive data between the computer and the network media.






43. A string that represents the location of a web resource






44. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.






45. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.






46. Port 22






47. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.






48. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.






49. ICMP Timestamp






50. An Application layer protocol - using TCP - for transporting files across an Internet connection. FTP transmits in clear text.






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests