Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The organization that governs the Internet's top-level domains - IP address allocation - and port number assignments.






2. ex 02






3. Computer software or hardware that can intercept and log traffic passing over a digital network.






4. A protocol used for sending and receiving log information for nodes on a network.






5. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.






6. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc






7. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur






8. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the






9. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).






10. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.






11. Port 137/138/139






12. nmap






13. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.






14. The steps taken to gather evidence and information on the targets you wish to attack.






15. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra






16. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






17. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).






18. A defined measure of service within a network system






19. A tool that helps a company to compare its actual performance with its potential performance.






20. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.






21. An adapter that provides the physical connection to send and receive data between the computer and the network media.






22. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi






23. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.






24. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.






25. A cyber attacker who acts without permission from - and gives prior notice to - the resource owner. Also known as a malicious hacker.






26. The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information






27. MAC Flooding






28. The process of pinging each address within a subnet to map potential targets. Ping sweeps are unreliable and easily detectable - but very fast.






29. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.






30. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.






31. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par






32. A storage buffer that transparently stores data so future requests for the same data can be served faster.






33. Window Scan






34. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.






35. Port Scanning

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


36. A small Trojan program that listens on port 777.






37. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.






38. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.






39. Part of a service contract where the level of service is formally defined; may be required as part of the initial pen test agreements.






40. Looking over an authorized user's shoulder in order to steal information (such as authentication information).






41. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.






42. A type of denial-of-service attack where a hacker sends thousands of SYN packets to the target with spoofed IP addresses.






43. Whether purposeful or the result of malware or other attack - a backdoor is a hidden capability in a system or program for bypassing normal computer authentication systems.






44. A business - government agency - or educational institution that provides access to the Internet.






45. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.






46. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely






47. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.






48. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.






49. Shifting responsibility from one party to another






50. An attack where the hacker repeats a portion of a cryptographic exchange in hopes of fooling the system into setting up a communications channel.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests