Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.






2. Hashing algorithm that results in a 128-bit output.






3. Nmap normal output






4. ICMP Type/Code 11






5. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.






6. Name given to expert groups that handle computer security incidents.






7. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can






8. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.






9. A document describing information security guidelines - policies - procedures - and standards.






10. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.






11. Devices - connected to one or more switches - grouped logically into a single broadcast domain. VLANs enable administrators to divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.






12. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






13. The lack of clocking (imposed time ordering) on a bit stream.






14. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.






15. Any network incident that prompts some kind of log entry or other notification.






16. Hex 10






17. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a






18. A backup facility with the electrical and physical components of a computer facility - but with no computer equipment in place. The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main






19. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.






20. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.






21. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.






22. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.






23. Malware designed to install some sort of virus - backdoor - and so on - on a target system.






24. An attack that is direct in nature - usually where the attacker injects something into - or otherwise alters - the network or system target.






25. Controls to detect anomalies or undesirable events occurring on a system.






26. Two or more LANs connected by a high-speed line across a large geographical area.






27. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.






28. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.






29. A storage buffer that transparently stores data so future requests for the same data can be served faster.






30. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.






31. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).






32. A device providing temporary - on-demand - point-to-point network access to users.






33. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.






34. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.






35. An unknown deficiency in software or some other product that results in a security vulnerability being identified.






36. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).






37. MAC Flooding






38. The cyclical practice of identifying - classifying - remediating - and mitigating vulnerabilities.






39. An attacker who breaks into computer systems with malicious intent - without the owner's knowledge or permission.






40. The process of using easily accessible DNS records to map a target network's internal hosts.






41. The exploitation of a security vulnerability






42. A network deployed as a trap to detect - deflect - or deter unauthorized use of information systems.






43. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.






44. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr






45. The process of systematically testing each port on a firewall to map rules and determine accessible ports.






46. A type 0 ICMP message used to reply to ECHO requests. Used with ping to verify network layer connectivity between hosts.






47. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.






48. Port Scanning

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


49. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.






50. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests