Test your basic knowledge |

CEH: Certified Ethical Hacker

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An approach to restricting system access to authorized users in which roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members of staff (or other system users) are assigned par






2. A protocol used for sending and receiving log information for nodes on a network.






3. A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.






4. FTP Bounce Attack






5. A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services. In this way - IP addresses of machines on your internal network are






6. A protocol that allows a client computer to request services from a server and the server to return the results.






7. A group of penetration testers that assess the security of an organization - which is often unaware of the existence of the team or the exact assignment.






8. A decision to reduce the potential for damage to or loss of an IT asset by taking some type of action






9. A hacking method for stealing the cookies used during a session build and replaying them for unauthorized connection purposes.






10. A series of documents and notes on standards used or proposed for use on the Internet; each is identified by a number.






11. An encryption standard designed by Joan Daemen and Vincent Rijmen. Chosen by a NIST contest to be the Advanced Encryption Standard (AES).






12. List Scan






13. Self-contained network with a limited number of participants who extend limited trust to one another in order to accomplish an agreed-upon goal.






14. A portion of memory used to temporarily store output or input data.






15. A self-replicating - self-propagating - self-contained program that uses networking mechanisms to spread itself.






16. Layer 2 of the OSI reference model. This layer provides reliable transit of data across a physical link. The Data Link layer is concerned with physical addressing - network topology - access to the network medium - error detection - sequential delive






17. Microsoft SID 500






18. An Ethernet networking system transmitting data at 100 million bits per second (Mbps) - 10 times the speed of an earlier Ethernet standard. Derived from the Ethernet 802.3 standard - it is also known as 100BaseT.






19. An attack that exploits the common mistake many people make when installing operating systems






20. A protocol for transporting data packets across a packet switched internetwork (such as the Internet). IP is a routed protocol.






21. A set of hardware - software - people - policies - and procedures needed to create - manage - distribute - use - store - and revoke digital certificates.






22. LAN standard - defined by ANSI X3T9.5 - specifying a 100Mbps token-passing network using fiber-optic cable and a dualring architecture for redundancy - with transmission distances of up to two kilometers.






23. A data encryption/decryption program often used for e-mail and file storage.






24. A card with a built-in microprocessor and memory used for identification or financial transactions. The card transfers data to and from a central computer when inserted into a reader.






25. Traffic-passing technique used by bridges and switches in which traffic received on an interface is sent out all interfaces on the device except the interface on which the information was originally received. Traffic on a switch is flooded when it is






26. A limited-function version of the Internetworking Operating System (IOS) - held in read-only memory in some earlier models of Cisco devices - capable of performing several seldom-needed low-level functions such as loading a new IOS into Flash memory






27. A denial-of-service attack where the attacker sends a ping to the network's broadcast address from the spoofed IP address of the target. All systems in the subnet then respond to the spoofed address - eventually flooding the device.






28. An international organization composed of national standards bodies from over 75 countries. Developed the OSI reference model.






29. A virus written in a macro language and usually embedded in document or spreadsheet files.






30. A distance-vector routing protocol that employs the hop count as a routing metric. The 'hold down time -' used to define how long a route is held in memory - is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops all






31. Confidentiality - Integrity - and Availability are the three aspects of security and make up the triangle.






32. The ability to trace actions performed on a system to a specific user or system entity.






33. Paranoid scan timing






34. Name given to expert groups that handle computer security incidents.






35. nmap






36. An API that provides services related to the OSI model's Session layer - allowing applications on separate computers to communicate over a LAN.






37. Wireless LAN standards created by IEEE. 802.11a runs at up to 54Mbps at 5GHz - 802.11b runs at 11Mbps at 2.4GHz - 802.11g runs at 54Mbps at 2.4GHz - and 802.11n can run upwards of 150MBps.






38. A set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work - including the right to copy - distribute - and adapt the work.






39. An inspection of a place where a company or individual proposes to work - to gather the necessary information for a design or risk assessment.






40. A structured set of criteria for evaluating computer security within products and systems produced by European countries; it has been largely replaced by the Common Criteria.






41. A partially protected zone on a network - not exposed to the full fury of the Internet - but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must a






42. Port 31337






43. A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).






44. A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource - such as a domain name - an IP address - or an autonomous system.






45. Directing a protocol from one port to another.






46. The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network. Occurs at layer 2 of the OSI reference model.






47. A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder - delete - insert - or read information.






48. A method in cryptography by which cryptographic keys are exchanged between users - allowing use of a cryptographic algorithm (for example - the Diffie-Hellman key exchange).






49. Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event.






50. Terminal Access Controller Access-Control System. A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests