Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The change or growth of a project's scope






2. Malicious code that uses a polymorphic engine to mutate while keeping the original algorithm intact; the code changes itself each time it runs - but the function of the code will not change.






3. A set of related communications protocols operating together as a group to address communication at some or all of the seven layers of the OSI reference model.






4. NSA






5. A widely used authentication protocol developed at the MassachusettsInstitute of Technology (MIT). Kerberos authentication uses tickets - Ticket Granting Service - and Key Distribution Center.






6. A biometric device that uses pattern-recognition techniques based on images of the irises of an individual's eyes.






7. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.






8. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman






9. A technology that establishes a tunnel to create a private - dedicated - leased-line network over the Internet. The data is encrypted so it's readable only by the sender and receiver. Companies commonly use VPNs to allow employees to connect securely






10. A comparison metric for different biometric devices and technologies; the point at which the false acceptance rate (FAR) equals the






11. The potential for damage to or loss of an IT asset






12. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all






13. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.






14. A security objective that ensures a resource can be accessed only by authorized users. This is also the property that sensitive information is not disclosed to unauthorized individuals - entities - or processes.






15. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.






16. A software or hardware application or device that captures user keystrokes.






17. The default network authentication suite of protocols for Windows NT 4.0






18. Black box test






19. A structured set of criteria for evaluating computer security within products and systems produced by European countries; it has been largely replaced by the Common Criteria.






20. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.






21. Baseband LAN specification developed by Xerox Corporation - Intel - and Digital Equipment Corporation. One of the least expensive - most widely deployed networking standards; uses the CSMA/CD method of media access control.






22. The ability to trace actions performed on a system to a specific user or system entity.






23. Normal scan timing






24. Evaluation in which testers attempt to penetrate the network.






25. Also known as a digital certificate - this is an electronic file used to verify a user's identity - providing non-repudiation throughout the system It is also a set of data that uniquely identifies an entity. Certificates contain the entity's public






26. A computer file system architecture used in Windows - OS/2 - and most memory cards.






27. Also known as a public key certificate - this is an electronic file that is used to verify a user's identity - providing non-repudiation throughout the sys-tem. Certificates contain the entity's public key - serial number - version - subject - algori






28. A file system used by the Mac OS.






29. IP Protocol Scan






30. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.






31. Manipulating a search string with additional specific operators to search for vulnerabilities or very specific information.






32. Access by information systems (or users) communicating from outside the information system security perimeter.






33. In penetration testing - this is a method of testing the security of a system or subnet without any previous knowledge of the device or network. Designed to simulate an attack by an outside intruder (usually from the Internet).






34. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.






35. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.






36. Part of a service contract where the level of service is formally defined; may be required as part of the initial pen test agreements.






37. Vulnerability Scanning






38. TCP Ping






39. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP






40. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.






41. An early network application that provides information on users currently logged on to a machine.






42. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.






43. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.






44. Phases of an attack






45. A symmetric - block-cipher data-encryption standard that uses a variablelength key that can range from 32 bits to 448 bits.






46. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.






47. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.






48. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.






49. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).






50. Describes practices in production and development that promote access to the end product's source materials.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests