Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.






2. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.






3. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.






4. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.






5. A computer virus that infects and spreads in multiple ways.






6. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.






7. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie






8. List Scan






9. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.






10. Polite scan timing






11. TCP SYN Scan






12. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points






13. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.






14. Xmas Tree scan






15. A unique numerical string - created by a hashing algorithm on a given piece of data - used to verify data integrity. Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download)






16. nmap






17. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.






18. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.






19. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.






20. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.






21. An Application layer protocol used by local email clients to retrieve e-mail from a remote server over a TCP/IP connection.






22. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.






23. Cracking Tools






24. A free and popular version of the Unix operating system.






25. The combination of all IT assets - resources - components - and systems.






26. A communications path - such as the Internet - authorized for data transmission within a computer system or network.






27. Any item of value or worth to an organization - whether physical or virtual.






28. nmap all output






29. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.






30. Directing a protocol from one port to another.






31. A group of experts that handles computer security incidents.






32. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator






33. Port 23






34. CAN-SPAM






35. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






36. Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or eight-digit hexadecimal number.






37. ex 02






38. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.






39. ICMP Type/Code 11






40. A portion of memory used to temporarily store output or input data.






41. LM Hash for short passwords (under 7)






42. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.






43. A mode of operation in a wireless LAN in which clients send data directly to one another without utilizing a wireless access point (WAP) - much like a point-to-point wired connection.






44. Software or hardware components that restrict access between a protected network and the Internet - or between other sets of networks - to block unwanted use or attacks.






45. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.






46. Recording the time - normally in a log file - when an event happens or when information is created or modified.






47. A software or hardware application or device that captures user keystrokes.






48. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.






49. A configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just frames addressed to it






50. An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.