Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. As an identification device becomes more sensitive or accurate - its FAR decreases while its FRR increases. The CER is the point at which these two rates are equal - or cross over.






2. A device that receives and sends data packets between two or more networks; the packet headers and a forwarding table provide the router with the information necessary for deciding which interface to use to forward packets.






3. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.






4. A security protocol for wireless local area networks defined in the 802.11b standard; intended to provide the same level of security as a wired LAN. WEP is not considered strong security - although it does authenticate clients to access points - encr






5. One or more locations from which control is exercised over a computer - television broadcast - or telecommunications network.






6. A computer file system architecture used in Windows - OS/2 - and most memory cards.






7. The process of recording activity on a system for monitoring and later review.






8. An informed decision to accept the potential for damage to or loss of an IT asset.






9. ICMP Netmask






10. Controls to detect anomalies or undesirable events occurring on a system.






11. A wireless LAN device that acts as a central point for all wireless traffic. The AP is connected to both the wireless LAN and the wired LAN - providing wireless clients access to network resources.






12. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.






13. A free and popular version of the Unix operating system.






14. Paranoid scan timing






15. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.






16. A Unix-like computer operating system descending from the BSD. Open-BSD includes a number of security features absent or optional in other operating systems.






17. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.






18. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.






19. Aggressive scan timing






20. Actions - devices - procedures - techniques - or other measures intended to reduce the vulnerability of an information system.






21. Shifting responsibility from one party to another






22. Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.






23. Safeguards or countermeasures to avoid - counteract - or minimize security risks.






24. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.






25. A method for detecting malicious code on a computer where the files are compared to signatures of known viruses stored in a database.






26. Any network incident that prompts some kind of log entry or other notification.






27. A Windows-based GUI version of nmap.






28. Microsoft SID 500






29. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.






30. Content Addressable Memory table. Holds all the MAC-address-to-port mappings on a switch.






31. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman






32. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).






33. A hybrid of the HTTP and SSL/TLS protocols that provides encrypted communication and secure identification of a web server.






34. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.






35. Window Scan






36. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.






37. Injecting traffic into the network to identify the operating system of a device.






38. A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.






39. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity






40. Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.






41. A program designed to browse websites in an automated - methodical manner. Sometimes these programs are used to harvest information from websites - such as e-mail addresses.






42. A protocol used for sending and receiving log information for nodes on a network.






43. An international encoding standard - working within multiple languages and scripts - that represents each letter - digit - or symbol with a unique numeric value that applies across different platforms.






44. An Application layer protocol for managing devices on an IP network.






45. A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.






46. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






47. Xmas Tree scan






48. The process of systematically testing each port on a firewall to map rules and determine accessible ports.






49. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.






50. The process of sending a packet or frame toward the destination. In a switch - messages are forwarded only to the port they are addressed to.






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests