Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie






2. A Windows-based GUI version of nmap.






3. Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones - PDAs - or laptop computers.






4. A security tool designed to protect a system or network against attacks by comparing traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out. Threats are rated and reported.






5. A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm - the length of the input block is the same as the length of the output block.






6. A proprietary - open - wireless technology used for transferring data from fixed and mobile devices over short distances.






7. The central part of a computer or communications system hardware firmware - and software that implements the basic security procedures for controlling access to system resources.






8. Microsoft SID 500






9. Hex 29






10. The act of using numerous electronic serial numbers on a cell phone until a valid number is located.






11. An announcement - typically from a software vendor - of a known security vulnerability in a program; often the bulletin contains instructions for the application of a software patch.






12. An evaluation consisting of a document review - interviews - and demonstrations - as well as vulnerability scans and hands-on testing.






13. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.






14. Formal description and evaluation of the vulnerabilities in an information system






15. The monetary value assigned to an IT asset.






16. A non-self-replicating program that appears to have a useful purpose - but in reality has a different - malicious purpose.






17. White hat






18. Occurs when authorized users accumulate excess privileges on a system due to moving from position to position.






19. A secret - typically consisting of only decimal digits - that a claimant memorizes and uses to authenticate his identity






20. Malware designed to install some sort of virus - backdoor - and so on - on a target system.






21. Idlescan






22. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.






23. Looking over an authorized user's shoulder in order to steal information (such as authentication information).






24. A term trademarked by the Wi-Fi Alliance - used to define a standard for devices to use to connect to a wireless network.






25. A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.






26. Computer software or hardware that can intercept and log traffic passing over a digital network.






27. A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.






28. A utility that traces a packet from your computer to an Internet host - showing how many hops the packet takes to reach the host and how long the packet requires to complete the hop.






29. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.






30. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).






31. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.






32. In computer security - this is an algorithm that uses separate keys for encryption and decryption.






33. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.






34. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.






35. Weakness in an information system - system security procedures - internal controls - or implementation that could be exploited or triggered by a threat source.






36. The conveying of official access or legal power to a person or entity.






37. A set of rules defined by a system administrator that indicates whether access is allowed or denied to resource objects.






38. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory






39. A section or subset of the network. Often a router or other routing device provides the end point of the segment.






40. Insane scan timing






41. The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption - with one notable exception: The private key is used to encrypt the digital signature.






42. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.






43. Port Scanning

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


44. An unknown deficiency in software or some other product that results in a security vulnerability being identified.






45. A virus written in a macro language and usually embedded in document or spreadsheet files.






46. A piece of software - provided by the vendor - intended to update or fix known - discovered problems in a computer program or its supporting data.






47. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa






48. An Application layer protocol for sending electronic mail between servers.






49. Nmap ml output






50. Window Scan







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests