Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IP Protocol Scan






2. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.






3. A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.






4. A point of reference used to mark an initial state in order to manage change.






5. CAN-SPAM






6. The concept of having more than one person required to complete a task






7. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.






8. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.






9. TCP Ping






10. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.






11. A defined measure of service within a network system






12. A backlog of packets stored in buffers and waiting to be forwarded over an interface.






13. An attack in which the hacker can derive information from the ciphertext without actually decoding it. Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.






14. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.






15. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.






16. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman






17. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.






18. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator






19. ICMP Netmask






20. Wrapper or Binder






21. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.






22. The result of using a private key to encrypt a hash value for identification purposes within a PKI system. The signature can be decoded by the originator's public key - verifying his identity and providing non-repudiation. A valid digital signature g






23. Independent review and examination of records and activities to assess the adequacy of system controls - to ensure compliance with established policies and operational procedures - and to recommend necessary changes.






24. Occurs when authorized users accumulate excess privileges on a system due to moving from position to position.






25. Polymorphic Virus






26. Nmap normal output






27. List Scan






28. ICMP Timestamp






29. Computer software or hardware that can intercept and log traffic passing over a digital network.






30. The process of using easily accessible DNS records to map a target network's internal hosts.






31. The directory service created by Microsoft for use on itsnetworks. Provides a variety of network services using Lightweight Directory Access Protocol (LDAP) - Kerberos-based authentication - and single sign-on for user access to network-based resourc






32. Cracking Tools






33. Port Scanning

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


34. A computer process that requests a service from another computer and accepts the server's responses.






35. An early network application that provides information on users currently logged on to a machine.






36. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.






37. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.






38. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.






39. PI and PT Ping






40. Process of breaking a packet into smaller units when it is being transmitted over a network medium that's unable to support a transmission unit the original size of the packet.






41. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o






42. Malware designed to install some sort of virus - backdoor - and so on - on a target system.






43. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.






44. A type of malware that covertly collects information about a user.






45. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






46. Attacks that take advantage of the built-in code and scripts most off-the-shelf applications come with.






47. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).






48. The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.






49. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.






50. Hex 10