Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.






2. Used for exchanging structured information - such as XML-based messages - in the implementation of web services






3. An Internet routing protocol used to exchange routing information within an autonomous system.






4. A virus written in a macro language and usually embedded in document or spreadsheet files.






5. The transmission of digital signals without precise clocking or synchronization.






6. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.






7. The change or growth of a project's scope






8. The process of recording activity on a system for monitoring and later review.






9. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.






10. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






11. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.






12. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.






13. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa






14. Any circumstance or event with the potential to adversely impact organizationaloperations - organizational assets - or individuals through an information system via unauthorized access - destruction - disclosure - modification of information - and/or






15. An anonymous connection to an administrative share (IPC$) on a Windows machine. Null sessions allow for enumeration of Windows machines - among other attacks.






16. Hex 12






17. ICMP Type/Code 3-13






18. ICMP Ping






19. A term representing the responsibility managers and their organizations have to provide information security to ensure the type of control - the cost of control - and the deployment of control are appropriate for the system being managed.






20. ACK Scan






21. Port 161/162






22. A network system of servers that translates numeric Internet Protocol (IP) addresses into human-friendly - hierarchical Internet addresses - and vice versa.






23. A protocol used to pass control and error messages between nodes on the Internet.






24. Any network incident that prompts some kind of log entry or other notification.






25. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.






26. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the






27. An Internet Protocol Security (IPSec) header used to verify that the contents of a packet have not been modified while the packet was in transit.






28. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are






29. Transmitting one protocol encapsulated inside another protocol.






30. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.






31. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.






32. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.






33. The potential for damage to or loss of an IT asset






34. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g






35. A social-engineering attack that manipulates the victim into calling the attacker for help.






36. nmap






37. A software or hardware defect that often results in system vulnerabilities.






38. A protocol that allows a client computer to request services from a server and the server to return the results.






39. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP






40. A free and popular version of the Unix operating system.






41. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.






42. An unknown deficiency in software or some other product that results in a security vulnerability being identified.






43. A record showing which user has accessed a given resource and what operations the user performed during a given period.






44. Using conversation or some other interaction between people to gather useful information.






45. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






46. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.






47. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.






48. The lack of clocking (imposed time ordering) on a bit stream.






49. A documented process for a procedure designed to be consistent - repeatable - and accountable.






50. Describes practices in production and development that promote access to the end product's source materials.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests