Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Normal scan timing






2. A documented process for a procedure designed to be consistent - repeatable - and accountable.






3. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.






4. The process of a system providing a fully qualified domain name (FQDN) to a local name server - for resolution to its corresponding IP address.






5. An extensible mechanism for e-mail. A variety of MIME types exist for sending content such as audio - binary - or video using the Simple Mail Transfer Protocol (SMTP).






6. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.






7. The science or study of protecting information - whether in transit or at rest - by using techniques to render the information unusable to anyone who does not possess the means to decrypt it.






8. A method of permitting only MAC addresses in a preapproved list network access. Addresses not matching are blocked.






9. A mode of operation in a wireless LAN in which clients send data directly to one another without utilizing a wireless access point (WAP) - much like a point-to-point wired connection.






10. Wrapper or Binder






11. In a classful IPv4 subnet - this is the network number with all binary 0s in the subnet part of the number. When written in decimal - the zero subnet has the same number as the classful network number.






12. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o






13. An Application layer protocol for managing devices on an IP network.






14. Steps taken to identify and limit risks to an acceptable or reasonable level of exposure.






15. A utility that sends an ICMP Echo message to determine if a specific IP address is accessible; if the message receives a reply - the address is reachable.






16. Security identifier. The method by which Windows identifies user - group - and computer accounts for rights and permissions.






17. The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information






18. An attack where the hacker positions himself between the client and the server - to intercept (and sometimes alter) data traveling between the two.






19. White hat






20. An Application layer protocol used primarily by Microsoft Windows to provide shared access to printers - files - and serial ports. It also provides an authenticated interprocess communication mechanism.






21. A method of falsely identifying the source of data packets; often used by hackers to make it difficult to trace where an attack originated.






22. Paranoid scan timing






23. Start of Authority record. This record identifies the primary name server for the zone. The SOA record contains the host name of the server responsible for all DNS records within the namespace - as well as the basic properties of the domain.






24. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).






25. Window Scan






26. Malware designed to install some sort of virus - backdoor - and so on - on a target system.






27. A mode of operation for a block cipher - with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value - and vice versa






28. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.






29. Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.






30. A text file stored within a browser by a web server that maintains information about the connection. Cookies are used to store information to maintain a unique but consistent surfing experience - but can also contain authentication parameters. Cookie






31. An organized collection of data.






32. Port 110






33. Incremental Substitution






34. Text or data in its encrypted form; the result of plaintext being input into a cryptographic algorithm.






35. A computer network confined to a relatively small area - such as a single building or campus.






36. A set of rules defined to screen network packets based on source address - destination address - or protocol; these rules determine whether the packet will be forwarded or discarded.






37. Port 23






38. The process of embedding information into a digital signal in a way that makes it difficult to remove.






39. Layer 6 of the OSI reference model. The Presentation layer ensures information sent by the Application layer of the sending system will be readable by the Application layer of the receiving system.






40. The process of using easily accessible DNS records to map a target network's internal hosts.






41. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.






42. Computer software or hardware that can intercept and log traffic passing over a digital network.






43. Freely and readily available information on an organization that can be gathered by a business entity about its competitor's customers - products - and marketing - and can be used by an attacker to build useful information for further attacks.






44. Cracking Tools






45. A background process found in Unix - Linux - Solaris - and other Unix-based operating systems.






46. MAC Flooding






47. The set of all hardware - firmware - and/or software components critical to IT security. Bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system.






48. Access by information systems (or users) communicating from outside the information system security perimeter.






49. Polite scan timing






50. A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests