Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process of using easily accessible DNS records to map a target network's internal hosts.






2. All measures and techniques taken to gather information about an intended target. Footprinting can be passive or active.






3. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc






4. A protocol for exchanging packets over a serial line.






5. RPC Scan






6. A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once it is decrypted.






7. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi






8. Hex 10






9. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.






10. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.






11. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with






12. Port 110






13. Using conversation or some other interaction between people to gather useful information.






14. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.






15. Ping Scan






16. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.






17. The means by which a recipient of a message can ensure the identity of the sender and that neither party can deny having sent or received the message. The most common method is through digital certificates.






18. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.






19. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






20. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.






21. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.






22. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.






23. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.






24. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col






25. Window Scan






26. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.






27. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.






28. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.






29. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo






30. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.






31. An organized collection of data.






32. A type of attack used to deny service to legitimate users of a network resource by intentionally overloading the network with illegitimate TCP connection requests. SYN packets are sent repeatedly to the target - but the corresponding SYN/ACK response






33. ICMP Type/Code 3






34. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.






35. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.






36. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.






37. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.






38. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.






39. The process of recording activity on a system for monitoring and later review.






40. The act of checking some sequence of tokens for the presence of the constituents of some pattern.






41. A hardware device used to log keystrokes covertly. Hardware keystroke loggers are very dangerous due to the fact that they cannot be detected through regular software/anti-malware scanning.






42. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets






43. A step-by-step method of solving a problem. In computing security - an algorithm is a set of mathematical rules (logic) for the process of encryption and decryption






44. A method of external testing whereby several systems or resources are used together to effect an attack.






45. nmap






46. A social-engineering attack using computer resources - such as e-mail or IRC.






47. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.






48. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive






49. A communications protocol used for browsing the Internet.






50. ICMP Netmask







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests