Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The concept of having more than one person required to complete a task






2. A free - open source version of the Berkeley Software Distribution of Unix - often used in embedded systems.






3. The conveying of official access or legal power to a person or entity.






4. The process of determining if a network entity (user or service) is legitimate






5. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory






6. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.






7. A type of malware that covertly collects information about a user.






8. CAN-SPAM






9. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.






10. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).






11. PI and PT Ping






12. A structured set of criteria for evaluating computer security within products and systems produced by European countries; it has been largely replaced by the Common Criteria.






13. A device providing temporary - on-demand - point-to-point network access to users.






14. Port 31337






15. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator






16. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.






17. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa






18. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.






19. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi






20. Policy stating what users of a system can and cannot do with the organization's assets.






21. The potential for damage to or loss of an IT asset






22. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.






23. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.






24. A tool that helps a company to compare its actual performance with its potential performance.






25. A command used in HTTP and FTP to retrieve a file from a server.






26. A Windows-based GUI version of nmap.






27. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.






28. A host designed to collect data on suspicious activity.






29. Insane scan timing






30. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).






31. A virus that plants itself in a system's boot sector and infects the master boot record.






32. A file system used by the Mac OS.






33. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points






34. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.






35. MAC Flooding






36. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.






37. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.






38. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.






39. A social-engineering attack using computer resources - such as e-mail or IRC.






40. FIN Scan






41. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.






42. Hex 12






43. Vulnerability Scanning






44. ACK Scan






45. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.






46. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.






47. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).






48. A NAT method in which multiple internal hosts - using private IP addressing - can be mapped through a single public IP address using the session IDs and port numbers. An internal global IP address can support in excess of 65 -000 concurrent TCP and U






49. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets






50. RPC Scan







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests