Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.






2. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.






3. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.






4. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.






5. Evaluation in which testers attempt to penetrate the network.






6. Microsoft SID 500






7. Black box test






8. Aggressive scan timing






9. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.






10. The change or growth of a project's scope






11. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra






12. A tool that helps a company to compare its actual performance with its potential performance.






13. FTP Bounce Attack






14. Describes practices in production and development that promote access to the end product's source materials.






15. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.






16. Sneaky scan timing






17. Computer software or hardware that can intercept and log traffic passing over a digital network.






18. A free and popular version of the Unix operating system.






19. A social-engineering attack using computer resources - such as e-mail or IRC.






20. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).






21. The ability to trace actions performed on a system to a specific user or system entity.






22. PI and PT Ping






23. A command used in HTTP and FTP to retrieve a file from a server.






24. Authentication confirms the identity of the user or device. Authorization determines the privileges (rights) of the user or device. Accounting records the access attempts - both successful and unsuccessful.






25. NSA






26. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.






27. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.






28. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.






29. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi






30. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.






31. Establish Null Session






32. An evaluation conducted to determine the potential for damage to or loss of an IT asset.






33. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.






34. Port 110






35. Black hat






36. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.






37. A hacker who aims to bring down critical infrastructure for a 'cause' and does not worry about the penalties associated with his actions.






38. A connectionless - layer 4 transport protocol. UDP is faster than TCP - but offers no reliability. A best effort is made to deliver the data - but no checks and verifications are performed to guarantee delivery. Therefore - UDP is termed a 'connectio






39. Window Scan






40. The software product or system that is the subject of an evaluation.






41. Formal description and evaluation of the vulnerabilities in an information system






42. UDP Scan






43. A computer process that requests a service from another computer and accepts the server's responses.






44. A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is - clearance) of users to access information of such sensi






45. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.






46. A virus designed to infect the master boot record.






47. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).






48. The steps taken to gather evidence and information on the targets you wish to attack.






49. Metamorphic Virus






50. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests