Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.






2. Idlescan






3. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.






4. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.






5. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can






6. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.






7. A tool that helps a company to compare its actual performance with its potential performance.






8. A Windows-based GUI version of nmap.






9. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman






10. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr






11. A host designed to collect data on suspicious activity.






12. A penetration test in which the ethical hacker has limited knowledge of the intended target(s). Designed to simulate an internal - but non-systemadministrator-level attack.






13. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).






14. An attack that combines a brute-force attack with a dictionary attack.






15. ICMP Type/Code 3-13






16. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.






17. A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle - and owners of the systems generally do not know their systems are compromised.






18. Black box test






19. Security measures - such as a locked door - perimeter fence - or security guard - to prevent or deter physical access to a facility - resource - or information stored on physical media.






20. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with






21. Metamorphic Virus






22. Shifting responsibility from one party to another






23. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.






24. Window Scan






25. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.






26. An outdated symmetric cipher encryption algorithm - previously U.S. government-approved and used by business and civilian government agencies. DES is no longer considered secure due to the ease with which the entire keyspace can be attempted using mo






27. A method of evaluating the security of a computer system or network by simulating an attack from a malicious source.






28. Looking over an authorized user's shoulder in order to steal information (such as authentication information).






29. A condition that occurs when more data is written to a buffer than it has space to store - and results in data corruption or other system errors. This is usually due to insufficient bounds checking - a bug - or improper configuration in the program c






30. A record showing which user has accessed a given resource and what operations the user performed during a given period.






31. The process of determining if a network entity (user or service) is legitimate






32. A wireless networking mode where all clients connect to the wireless network through a central access point.






33. A sublayer of layer 2 of the OSI model - the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.






34. A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce - banking - and other sites requiring privacy.






35. Monitoring of telephone or Internet conversations - typically by covert means.






36. A free and popular version of the Unix operating system.






37. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.






38. ICMP Ping






39. The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information






40. An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.






41. A value assigned to uniquely identify a single wide area network (WAN) in wireless LANs. SSIDs are broadcast by default - and are sent in the header of every packet. SSIDs provide no encryption or security.






42. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.






43. Black hat






44. Any network incident that prompts some kind of log entry or other notification.






45. ICMP Type/Code 8






46. A protocol for exchanging packets over a serial line.






47. Port 110






48. A list of IP addresses and corresponding MAC addresses stored on a local computer.






49. Two or more LANs connected by a high-speed line across a large geographical area.






50. The level of importance assigned to an IT asset







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests