click below
click below
Normal Size Small Size show me how
CEH - Terms A & B
Certified Ethical Hacker Terms and Definitions - A & B - info tech
| Question | Answer |
|---|---|
| Wireless LAN standard that runs at up to 54Mbps and 5GHz? | 802.11a |
| Wireless LAN standard that runs at 11Mbps and 2.4GHz? | 802.11b |
| Wireless LAN standard that runs upward of 150Mbps? | 802.11n |
| Wireless LAN security standard that requires TKIP and AES encryption? | 802.11i |
| An authorized user gains excess priviliges on a system by moving positions (admins not updating permissions correctly). | Access Creep |
| A LAN device acting as a central point for wireless traffic, providing wireless users access to network resources. | Access Point (AP) |
| Ability to trace actions performed on a system to a specific user. | Accountability |
| A TCP flag that notifies an orginating node that the preceding packet was received. | ACK (acknowledgment) |
| It provides a variety of network services using Lightweight Directory Access Protocol (LDAP), Kerberos-based authentication, and single sign-on for user access to network-based resources. Created by Microsoft. | AD (Active Directory) |
| Injecting traffic into a network to identify the OS (operating system) of a device. | Active Fingerprinting |
| Wireless LAN mode of operation where clients send data to each other directly in a point-to-point configuration. | Ad Hoc Mode |
| A protocol used to map a known IP address to a physical (MAC) address, defined in RFC 826. | ARP (address resolution protocol) |
| A list of IP addresses and corresponding MAC addresses stored on a local computer. | ARP (address resolution protocol) Table |
| Embedded software that serves advertisements (usually in the form of pop ups). | Adware |
| In computing security, a set of mathematical rules (logic), for the process of encryption and decryption. | Algorithm |
| The product (multiple) of the Annual Rate of Occurance (ARO) x the Single Loss Expectancy (SLE). Express as a formula. | ALE (annualized loss expectancy) - ALE = ARO x SLE |
| Device or service used in attempt to make traffic between a client and the internet as untraceable as possible. | Anonymizer |
| Usually signature-based. Attempts to identify and block malware and viruses from entering a network or system. | AV (antivirus software) |
| Layer 7 of the OSI reference model. FTP and SMTP reside here. | Application Layer |
| Attacks on the programming code of an application. | Application-level attacks |
| In computing. Generally refers to backup copies of logs and/or data. Historical records. | Archives |
| In computer security. Activity to determine if a security control is implemented correctly and operating as intended. | Assessment |
| Any item of worth to an entity or individual, whether physical or intellectual | Asset |
| An attack where something is injected into or otherwise alters the network or target system. | Active Attack |
| In computing. A difference in upstream/downstream network speeds. In Com Security. The use of more than one key for encryption/authentication purposes. "not the same" | Asymmetric |
| In computer security. An algorithm that uses different keys for encyption/decryption. | Asymmetric Algorithm |
| The lack of clocking on a bit stream (no imposed time ordering). | Asynchronous |
| The transmission of digital signals with no precise clocking or synchronization. | Asynchronous Transmission |
| An independent review of the records and activities of an IT system to assess the compliance of, and adequacy of, current system controls and policies. | Audit |
| Chronological record of system events and changes. | Audit Data |
| Records showing which users have accessed a given resource and what operations were performed. | Audit Trail |
| The process of recording activity on a system for monitoring and later review. | Auditing |
| Usually accomplished via a username and password. Determining if a person is legitimate and authorized to access a system and its resources. | Authentication |
| Authentication - identifies user. Authorization - determines privileges (rights). Accounting - records access attempts. | AAA - Authentication, Authorization, Accounting |
| An IPSEC (IP security) header used to verify the contents of a packet have not been modified while in transit. | AH (Authentication Header) |
| Granting official access or legal power to a person or entity. | Authorization |
| The condition of a system or resource being ready for use and accessible by authorized users. | Availability |
| A hidden capability in a system or program for bypassing normal computer authentication processes. | Backdoor |
| An enumeration technique generally used for operating system identification (also known as fingerprinting). | Banner Grabbing |
| The initial state of a system. Used as a reference point for monitoring system performance. | Baseline |
| A computer placed outside of a firewall to provide public services to other internet sites, and hardened to ward off external attacks. | Bastion Host |
| Facial imagery, fingerprints, retina. Unique physical characteristics used to verify identity. | Biometrics |
| A cryptographic attack where bits are manipulated in the ciphertext itself to generate a predictable outcome in the plaintext once decrypted. | Bit Flipping |
| Method of testing the security of a system or subnet without any previous knowledge of the network. Truest simulation of an attack on a system. | Black Box Testing |
| An attacker who breaches computer systems with malicious intent and without the owner's knowledge or permission. | Black Hat |
| A symmetric cryptographic algorithm that transforms one block of data at a time using a cryptographic key. The input block is the same length as the output block. | Block Cipher |
| Symmetric, block-cipher data-encryption. Uses variable length key that ranges from 32 bits to 448 bits. | Blowfish |
| Sending unsolicited messages via Bluetooth devices. | Bluejacking |
| Unauthorized access to information on a wireless device via a bluetooth connection. | Bluesnarfing |
| A proprietary, open, wireless technology used for transferring data between mobile devices over short distances. | Bluetooth |
| A virus that plants itself in a system's boot sector and infects the master boot record. | Boot Sector Virus |
| Method of password cracking where all possible options systematically attempted until a match is found. | Brute-Force Password Attack |
| A portion of memory used to temporarily store output or input data. | Buffer |
| A condition that occurs when more data is written to a buffer than it has space to store. Results in data corruption or other system errors. | Buffer Overflow |
| Software or hardware defects that often result in system vulnerabilities. | Bug |