Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A trusted entity that issues and revokes public key certificates. In a network - a CA is a trusted entity that issues - manages - and revokes security credentials and public keys for message encryption and/or authentication. Within a public key infra






2. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.






3. White hat






4. The Security Accounts Manager file in Windows stores all the password hashes for the system.






5. A collection of historical records or the place where they are kept. In computing - an archive generally refers to backup copies of logs and/or data.






6. Directory Transversal






7. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col






8. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all






9. Controls to detect anomalies or undesirable events occurring on a system.






10. An Application layer protocol for managing devices on an IP network.






11. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.






12. Window Scan






13. A protocol used to pass control and error messages between nodes on the Internet.






14. A documented process for a procedure designed to be consistent - repeatable - and accountable.






15. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.






16. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.






17. A software or hardware application or device that captures user keystrokes.






18. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.






19. A one-way mathematical function that generates a fixedlength numerical string (hash) from a given data input. MD5 and SHA-1 are hashing algorithms.






20. Phases of an attack






21. A Windows-based GUI version of nmap.






22. UDP Scan






23. A point of reference used to mark an initial state in order to manage change.






24. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.






25. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa






26. The level of importance assigned to an IT asset






27. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.






28. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.






29. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc






30. A denial-of-service technique that uses numerous hosts to perform the attack.






31. ICMP Type/Code 8






32. Another term for firewalking






33. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.






34. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.






35. Ping Scan






36. A small space having two sets of interlocking doors; the first set of doors must close before the second set opens. Typically authentication is required for each door - often using different factors. For example - a smart card may open the first door






37. A data encryption/decryption program often used for e-mail and file storage.






38. ICMP Type/Code 3-13






39. A computer network confined to a relatively small area - such as a single building or campus.






40. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is






41. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.






42. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.






43. The process of using easily accessible DNS records to map a target network's internal hosts.






44. Computer software or hardware that can intercept and log traffic passing over a digital network.






45. Occurs when authorized users accumulate excess privileges on a system due to moving from position to position.






46. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.






47. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.






48. The change or growth of a project's scope






49. Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.






50. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests