Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CEH -Terms K L M N O

Certified Ethical Hacker Terms & Definitions - K, L, M, N, O & P - info tech

QuestionAnswer
An authentication protocol that uses tickets, Ticket Granting Service and a Key Distribution Center. Developed at MIT (Massachusetts Institute of Technology). Kerberos
A cryptography method in which cryptographic keys are exchanged between users, allowing the use of a cryptographic algorithm (i.e., Diffe-Hellman) KEP (Key Exchange Protocol)
Software or Hardware application or device that captures and records a user's keystokes. Keylogger
A programming principle where the last piece of data added to the stack is the first piece of data taken off. LIFO (Last in First Out)
An evaluation which consists of interviews, Document reviews and demonstrations. There are no hands-on testing. Level I Assessment
An evaluation which consisists of interviews, document reviews, demonstrations, vulnerability scans and hands-on testing. Level II Assessment
An evaluation where testers attempt to penetrate the network. Level III Assessment
A legal limit on the amount of financial liability and remedies an organization is responsible for taking on. Limits of Liability
A computer network confined to a relatively small area, such as a single building or campus. LAN (Local Area Network)
A piece of malicious code inserted into a software system that will perform a malicious function when the specified conditions are met at some future point. Logic Bomb
A method of only permitting preapproved MAC addresses to access the network. All non-matching MAC addresses are blocked. MAC Filtering
A virus written in a (_blank_) language that is usually embedded in documents and spreadsheet files. Macro Virus
Software or firmware intended to perform unauthorized processes that impact the CIA of an information system. Can be a virus, worm, Trojan, logic bomb, etc. Malicious Code (or Malware)
An attack where the hacker positions himself between the client and the server in order to intercept data traveling between the two. Man-in-the-middle Attack
In this configuration, access to system resources are controlled by a security policy administrator. Users do not have the ability to override policy and grant access to files. Mandatory Access Control
A small space between two sets of interlocking doors. The first door must close before the second door opens. Separate authentication for each door is typically required. Mantrap
A hashing algorithm that results in a 128-bit output. MD5
This sublayer of Layer 2 (Data Link) OSI reference model, emulates a full duplex logical communication channel in a multi-point network. Media Access Control (MAC)
A documented process for a procedure designed to be consistent, repeatable, and accountable. Methodology
A computer virus that infects and spreads in multiple ways. Multipartite Virus
An extensible mechanism for e-mail. Varieties exist for sending content such as audio, binary, or video using SMTP (Simple Mail Transfer Protocol) MIME (Multipurpose Internet Mail Extensions)
A systematic process for the assessment of security vulnerabilities. NSA IAM National Security Agency INFOSEC Assessment Methodology
A free, open source version of the Berkeley Software Distribution of Unix, often used in embedded systems. NetBSD
A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware. NetBus
A Device providing temporary, on-demand, point-to-point network access to users. Network Access Server
The process of modifying IP packet headers while in transit across a traffic routing device. Provides one-to-one translation of IP addresses. NAT (Network Address Translation)
An API that provides services related to the OSI model's Session Layer, allowing applications on separate computers to communicate over a LAN. NetBIOS
An adapter that provides the physical connection to send and receive data between the computer and the network media. NIC (Network Interface Card)
One or more locations from which control is exercised over a computer or telecommunications network. NOC (Network Operations Center)
Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic. Network Tap
A device on a network. Node
The result of the utilization of digital certificates, whereby the identity of the sender of a message cannot be denied. Non-Repudiation
A command that instructs the system to do nothing. Many overflow attacks involve this command as a series of stringed operators (known as a ____ Sled) NOP (nope sled)
A commond-line tool available for many operating systems for querying of the Domain Name System (DNS) to obtain domain name or IP address records. nslookup
The default network authentication suite of protocols for Windows NT 4.0. It is considered insecure and was replaced by NTLMv2. NT LAN Manager (NTLM)
An anonymous connection to an administrative share (IPC$) on a Windows machine. This session can allow for enumeration of a Windows machine, among other attacks. Null Session
The practice in development of software products that allows access and modification by any would be developer. Open Source
A network architecture framework, Developed by the ISO. It describes the communications process between two systems across the Internet. Open System Interconnection (OSI) Reference Model
An attack that exploits the common mistake many people make when installing operating systems, which is, accepting and leaving all of the system defaults as is. Operating System Attack
Transmission using channels or frequencies outside those normally used for data transfer: often used for error reporting. Out-of-band Signaling
A communications path, such as the Internet, authorized for data transmission within a computer system or network. Overt Channel
A unit of information formatted according to specific protocols that allows for the precise transmission of data from one network node to another. Also called a datagram. Packet
Controlling access to a network by analyzing the headers of incoming and outgoing packets. Packets will be discarded or allowed to pass through based on rule sets enacted by a network administrator. Packet Filtering
A utility that uses an ICMP Echo message to determine if a specific IP address is accessible. If the message receives a reply, the address is reachable. Packet Internet Groper (Ping)
An attack where the hacker manipulates parameters within a URL string in hopes of modifying data. Parameter Tampering
An attack where the attacker intercepts data in transit along the network between the sending and receiving points, but does not alter the data (basically avesdropping). Passive Attack
This simple PPP authentication method sends clear text username and passwords to verify against a table listing the authoized users. PAP (Password Authentication Protocol)
A piece of software intended to update or fix a known problem. Usually provided by the OEM vendor of the program. Patch
The contents of a packet. A system attack requires that the attacker delivers this and it then needs to be executed by the system. Payload
The method of evaluating the security of a computer system or network by simulating an attack from a malicious source. Penetration Testing
The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information -- usually via a carefully crafted email message. Phishing
Security measures, such as a locked door, perimeter fence, or security guards. Used to prevent or deter physical access to facilities and physical media. Physical Security
When an authorized person allows someone to pass through a secure door behind them without using an access card, pin or biometrics, thereby bypassing physical security measures. Piggybacking
The process of pinging each address within a subnet to map potential targets. Very fast but easily detectable. Ping Sweep
A virus that changes each time it runs. It uses a _____ engine to change the code but keeps the function intact. Polymorphic Virus
Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits. PPP (Point-to-Point)
A VPN tunneling protocol with encryption. It initiates a tunnel by communicating to the peer on TCP port 1723. A GRE tunnel is initiated to the same peer. GRE packets are encapsulated into IP packets and seen as IP protocol 47. PPTP (Point-to-Point Tunneling Protocol)
Generic Routing Encapsulation (GRE) GRE (Generic Routing Encapsulation)
A technology where multiple internal IP addresses on a network are hidden behind one advertised Public IP address. A many-to-one NAT. PAT (Port Address Translation)
The process of using an application to remotely identify open ports on a system, then verifying if the system will allow connections through these ports. Port Scanning
Another term for Firewalking. Externally testing firewalls for open ports by generating a connection attempt on each port. Port Knocking
Directing a protocol from one port to another port. Port Redirection
An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET command. POST
An application layer protocol used to retrieve email from a remote server over a TCP/IP connection. Utilizes Port 110 and for secure encrypted TLS or SSL connection uses Port 995. POP3 (Post Office Protocol)
Layer 6 of the OSI reference model. This layer makes sure that information sent by the Application layer of the sending system is readable by the Application Layer of the receiving system. Presentation Layer
A data encryption/decryption program often used for e-mail and file storage. PGP (Pretty Good Privacy)
The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. It is one of two keys in the PKI system and is never shared. Private Key
The non-routable IP address range intended for use only within the confines of a single entity. 10.0.0.0, 172.16-31.0.0, 192.168.0.0 Private Network Address
The configuration of a network card that makes the card pass all traffic it receives to the CPU. Windows uses WinPcap. Linux uses libcap. Promiscuous Mode
A formal set of rules describing data transmission, especially across a network. It will determin the type of error checking, data compression methods and how systems will indicate completion of send and receipt. Protocol
A set of related communications protocols operating together as a group. Think OSI Reference model. Protocol Stack
A device set up to send a response on behalf of an end node to the requesting host. Generally used to hide the host from the Internet. Proxy Server
The shared key in an asymmetric key pair. Typically used to encrypt data or verify signatures. Public Key
A set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. PKI (Public Key Infrastructure)
Created by: infotech
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards