Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.






2. Injecting traffic into the network to identify the operating system of a device.






3. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.






4. A program designed to execute at a specific time to release malicious code onto the computer system or network.






5. A standard that provides best-practice recommendations on information security management for use by those responsible for initiating - implementing - or maintaining Information Security Management Systems (ISMS). Information security is defined with






6. A systematic process for the assessment of security vulnerabilities.






7. The ability to trace actions performed on a system to a specific user or system entity.






8. The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).






9. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.






10. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.






11. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.






12. An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.






13. nmap all output






14. Describes practices in production and development that promote access to the end product's source materials.






15. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.






16. Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.






17. The process of embedding information into a digital signal in a way that makes it difficult to remove.






18. A denial-of-service technique that uses numerous hosts to perform the attack.






19. Calculations of two components of risk: R - the magnitude of the potential loss (L) - and the probability - p - that the loss will occur.






20. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.






21. A VPN tunneling protocol with encryption. PPTP connects two nodes in a VPN by using one TCP port for negotiation and authentication and one IP protocol for data transfer.






22. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.






23. The process of systematically testing each port on a firewall to map rules and determine accessible ports.






24. A computer file system architecture used in Windows - OS/2 - and most memory cards.






25. 1. The path a packet travels to reach the intended destination. Each individual device along the path traveled is called a hop. 2. Information contained on a device containing instructions for reaching other nodes on the network. This information can






26. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.






27. A protocol defining packets that are able to be routed by a router.






28. The process of transforming ciphertext into plaintext through the use of a cryptographic algorithm.






29. The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information






30. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.






31. A domain composed of all the systems sharing any given physical transport media. Systems within a collision domain may collide with each other during the transmission of data. Collisions can be managed by CSMA/CD (collision detection) or CSMA/CA (col






32. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a






33. A type of encryption where the same key is used to encrypt and decrypt the message.






34. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.






35. A computer network confined to a relatively small area - such as a single building or campus.






36. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.






37. Formerly Redundant Array of Inexpensive Disks; a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit - where data is distributed acr






38. Set of tools (applications or code) that enables administrator-level accessto a computer or computer network and is designed to obscure the fact that the system has been compromised. Rootkits are dangerous malware entities that provide administrator






39. Directing a protocol from one port to another.






40. Originally an extension of PPP - this is a protocol for authentication used within wireless networks. Works with multiple authentication measures.






41. A networking configuration where all nodes are connected in a circle with no terminated ends on the cable.






42. The monetary loss that can be expected for an asset due to risk over a one-year period. ALE is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as ALE = ARO






43. Layer 7 of the OSI reference model. The Application layer provides services to applications - which allow them access to the network. Protocols such as FTP and SMTP reside here.






44. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o






45. A group of experts that handles computer security incidents.






46. LM Hash for short passwords (under 7)






47. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.






48. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.






49. A person or entity indirectly involved in a relationship between two principles.






50. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests