Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An electronic version of junk mail. Unsolicited commercial e-mail sent to numerous recipients.






2. A device set up to send a response on behalf of an end node to the requesting host. Proxies are generally used to obfuscate the host from the Internet.






3. Incremental Substitution






4. Physical socket provided on routers and switches for cable connections between a computer and the router/switch. This connection enables the computer to configure - query - and troubleshoot the router/switch by use of a terminal emulator and a comman






5. ICMP Netmask






6. A form of fraud in which someone pretends to be someone else by assuming that person's identity - typically in order to access resources or obtain credit and other benefits in that person's name.






7. A computer network confined to a relatively small area - such as a single building or campus - in which devices connect through high-frequency radio waves using IEEE standard 802.11.






8. An Application layer protocol for managing devices on an IP network.






9. ACK Scan






10. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.






11. A situation in which an IDS or other sensor triggers on an event as an intrusion attempt - when it was actually legitimate traffic.






12. A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.






13. ICMP Type/Code 3-13






14. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.






15. An organization's threshold for the seven areas of information security responsibility. This level is established based on the objectives for maintaining confidentiality - integrity - and availability of the organization's IT assets and infrastructur






16. Controls internal to a system designed to resolve vulnerabilities and errors soon after they arise.






17. 18 U.S.C. 1029






18. Port 88






19. The process of using an application to remotely identify open ports on a system (for example - whether systems allow connections through those ports).






20. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.






21. A denial-of-service technique that uses numerous hosts to perform the attack.






22. An industry standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.






23. A physical security attack where the attacker sifts through garbage and recycle bins for information that may be useful on current and future attacks






24. A symmetric key cipher where plaintext bits are combined with a pseudo-random cipher bit stream (keystream) - typically by an exclusive-or (XOR) operation. In a stream cipher the plaintext digits are encrypted one at a time - and the transformation o






25. A protocol that allows a client computer to request services from a server and the server to return the results.






26. An evaluation consisting of a document review - interviews - and demonstrations. No hands-on testing is performed.






27. The act of dialing all numbers within an organization to discover open modems.






28. A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.






29. An enumeration technique used to provide information about a computer system; generally used for operating system identification (also known as fingerprinting).






30. A method used to prevent IDS detection by dividing the request into multiple parts that are sent in different packets






31. White hat






32. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.






33. The transmission of digital signals without precise clocking or synchronization.






34. A formal set of rules describing data transmission - especially across a network. A protocol determines the type of error checking - the data compression method - how the sending device will indicate completion - how the receiving device will indicat






35. The act of searching for Wi-Fi wireless networks by a person in a moving vehicle - using a portable device.






36. An organization composed of engineers - scientists - and students who issue standards related to electrical - electronic - and computer engineering.






37. Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.






38. Port 22






39. A well-known and studied phenomenon of human nature - whereby a single trait influences the perception of other traits.






40. A communications channel that is being used for a purpose it was not intended for - usually to transfer information secretly.






41. The Security Accounts Manager file in Windows stores all the password hashes for the system.






42. A standard for encrypting e-mail - web pages - and other stream-oriented information transmitted over the Internet.






43. A software license agreement; a contract between the 'licensor' and purchaser establishing the right to use the software.






44. The process of determining if a network entity (user or service) is legitimate






45. The process of embedding information into a digital signal in a way that makes it difficult to remove.






46. A program designed to execute at a specific time to release malicious code onto the computer system or network.






47. The software product or system that is the subject of an evaluation.






48. Controlling access to a network by analyzing the headers of incoming and outgoing packets - and letting them pass or discarding them based on rule sets created by a network administrator. A packet filter allows or denies packets based on destination






49. A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.






50. A file system used by the Mac OS.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests