Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An application that monitors a computer or network to identify - and prevent - malware. AV is usually signature-based - and can take multiple actions on defined malware files/activity.






2. Malware designed to install some sort of virus - backdoor - and so on - on a target system.






3. A storage buffer that transparently stores data so future requests for the same data can be served faster.






4. A protocol defining packets that are able to be routed by a router.






5. A record showing which user has accessed a given resource and what operations the user performed during a given period.






6. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory






7. Directing a protocol from one port to another.






8. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).






9. An attack technique that tricks your DNS server into believing it has received authentic information when - in reality - it has been provided fraudulent data. DNS cache poisoning affects user traffic by sending it to erroneous or malicious end points






10. An authentication method on point-to-point links - using a three-way handshake and a mutually agreed-upon key.






11. A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.






12. A virus written in a macro language and usually embedded in document or spreadsheet files.






13. Used to find the domain name associated with an IP address; the opposite of a DNS lookup.






14. A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.






15. An informed decision to accept the potential for damage to or loss of an IT asset.






16. don't ping






17. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.






18. A value used to control cryptographic operations - such as decryption -encryption - signature generation - and signature verification.






19. Conversion of plaintext to ciphertext through the use of a cryptographic algorithm.






20. A measurable - physical characteristic used to recognize the identity - or verify the claimed identity - of an applicant. Facial images - fingerprints - and handwriting samples are all examples of biometrics.






21. An attack that combines a brute-force attack with a dictionary attack.






22. In computer security - this is an algorithm that uses separate keys for encryption and decryption.






23. Port 88






24. A method of network traffic filtering that monitors the entire communications process - including the originator of the session and from which direction it started.






25. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.






26. A point-to-point connection between two endpoints created to exchangedata. Typically a tunnel is either an encrypted connection - or a connection using a protocol in a method for which it was not designed. An encrypted connection forms a point-to-poi






27. 18 U.S.C. 1029






28. An e-mail protection method using a secret message or image that can be referenced on any official communication with the site; if an e-mail is received without the image or message - the recipient knows it is not legitimate.






29. A business - government agency - or educational institution that provides access to the Internet.






30. A remote control program in which the client runs on a local computer and connects to a remote server on a network. Commands entered locally are executed on the remote system.






31. A unit of information formatted according to specific protocols that allows precise transmittal of data from one network node to another. Also called a datagram or data packet - a packet contains a header (container) and a payload (contents). Any IP






32. Software that has advertisements embedded within. Generally displays ads in the form of pop-ups.






33. A function that is easy to compute in one direction - yet believed to be difficult to compute in the opposite direction (finding its inverse) without special information - called the 'trapdoor.' Widely used in cryptography.






34. The Security Accounts Manager file in Windows stores all the password hashes for the system.






35. Monitoring of telephone or Internet conversations - typically by covert means.






36. A three-step process computers execute to negotiate a connection with one another. The three steps are SYN - SYN/ACK - ACK.






37. RPC Scan






38. A protocol used for sending and receiving log information for nodes on a network.






39. Shifting responsibility from one party to another






40. A backlog of packets stored in buffers and waiting to be forwarded over an interface.






41. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.






42. A class of algorithms for cryptography that use the same cryptographic key for both decryption and encryption.






43. A nonroutable IP address range intended for use only within the confines of a single organization - falling within the predefined ranges of 10.0.0.0 - 172.16-31.0.0 - or 192.168.0.0.






44. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.






45. ICMP Type/Code 8






46. A file system used by the Mac OS.






47. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.






48. ICMP Netmask






49. Directory Transversal






50. A connection-oriented - layer 4 protocol for transporting data over network segments. TCP is considered reliable because it guarantees delivery and the proper reordering of transmitted packets. This protocol is used for most long-haul traffic on the







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests