Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hex 10






2. A storage buffer that transparently stores data so future requests for the same data can be served faster.






3. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.






4. A TCP flag notifying an originating station that the preceding packet (or packets) has been received.






5. Malware designed to install some sort of virus - backdoor - and so on - on a target system.






6. The public portion of an asymmetric key pair typically used to encrypt data or verify signatures. Public keys are shared and are used to encrypt messages.






7. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.






8. A suite of protocols used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. This suite includes protocols for establishing mutual authentication between agents at the sessio






9. The lack of clocking (imposed time ordering) on a bit stream.






10. A brand name of analog scrambling and de-scrambling equipment for cable and satellite television - invented primarily to keep consumer Television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.






11. A skilled hacker that straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain). Gray hats sometime perform illegal acts to exploit technology with the intent of achi






12. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.






13. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.






14. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.






15. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.






16. A command used in HTTP and FTP to retrieve a file from a server.






17. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks






18. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc






19. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.






20. Hex 14






21. In regard to hash algorithms - this occurs when two or more distinct inputs produce the same output.






22. An information assurance strategy in which multiple layers of defense are placed throughout an Information Technology system.






23. A hardware device used to log keystrokes covertly. Hardware keystroke loggers are very dangerous due to the fact that they cannot be detected through regular software/anti-malware scanning.






24. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.






25. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.






26. A computer security expert who performs security audits and penetration tests against systems or network segments - with the owner's full knowledge and permission - in an effort to increase security.






27. An attack that combines a brute-force attack with a dictionary attack.






28. A derogatory term used to describe an attacker - usually new to the field - who uses simple - easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.






29. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.






30. The concept of having more than one person required to complete a task






31. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.






32. 18 U.S.C. 1029






33. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.






34. Host-based IDS. An IDS that resides on the host - protecting against file and folder manipulation and other host-based attacks and actions.






35. A firewall evasion technique whereby packets are wrapped in HTTP - as a covert channel to the target.






36. A computer process that requests a service from another computer and accepts the server's responses.






37. Security identifier. The method by which Windows identifies user - group - and computer accounts for rights and permissions.






38. The process of using easily accessible DNS records to map a target network's internal hosts.






39. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with






40. Idlescan






41. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.






42. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator






43. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.






44. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.






45. An adapter that provides the physical connection to send and receive data between the computer and the network media.






46. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.






47. ICMP Type/Code 0-0






48. A communications path - such as the Internet - authorized for data transmission within a computer system or network.






49. Network Scanning






50. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests