Certified Ethical Hacker Terms & Definitions - K, L, M, N, O & P - info tech
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
An authentication protocol that uses tickets, Ticket Granting Service and a Key Distribution Center. Developed at MIT (Massachusetts Institute of Technology). | show 🗑
|
||||
show | KEP (Key Exchange Protocol)
🗑
|
||||
show | Keylogger
🗑
|
||||
show | LIFO (Last in First Out)
🗑
|
||||
show | Level I Assessment
🗑
|
||||
show | Level II Assessment
🗑
|
||||
show | Level III Assessment
🗑
|
||||
show | Limits of Liability
🗑
|
||||
show | LAN (Local Area Network)
🗑
|
||||
A piece of malicious code inserted into a software system that will perform a malicious function when the specified conditions are met at some future point. | show 🗑
|
||||
A method of only permitting preapproved MAC addresses to access the network. All non-matching MAC addresses are blocked. | show 🗑
|
||||
show | Macro Virus
🗑
|
||||
show | Malicious Code (or Malware)
🗑
|
||||
An attack where the hacker positions himself between the client and the server in order to intercept data traveling between the two. | show 🗑
|
||||
show | Mandatory Access Control
🗑
|
||||
show | Mantrap
🗑
|
||||
A hashing algorithm that results in a 128-bit output. | show 🗑
|
||||
This sublayer of Layer 2 (Data Link) OSI reference model, emulates a full duplex logical communication channel in a multi-point network. | show 🗑
|
||||
show | Methodology
🗑
|
||||
A computer virus that infects and spreads in multiple ways. | show 🗑
|
||||
show | MIME (Multipurpose Internet Mail Extensions)
🗑
|
||||
show | National Security Agency INFOSEC Assessment Methodology
🗑
|
||||
A free, open source version of the Berkeley Software Distribution of Unix, often used in embedded systems. | show 🗑
|
||||
A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware. | show 🗑
|
||||
A Device providing temporary, on-demand, point-to-point network access to users. | show 🗑
|
||||
The process of modifying IP packet headers while in transit across a traffic routing device. Provides one-to-one translation of IP addresses. | show 🗑
|
||||
show | NetBIOS
🗑
|
||||
An adapter that provides the physical connection to send and receive data between the computer and the network media. | show 🗑
|
||||
One or more locations from which control is exercised over a computer or telecommunications network. | show 🗑
|
||||
show | Network Tap
🗑
|
||||
A device on a network. | show 🗑
|
||||
show | Non-Repudiation
🗑
|
||||
show | NOP (nope sled)
🗑
|
||||
A commond-line tool available for many operating systems for querying of the Domain Name System (DNS) to obtain domain name or IP address records. | show 🗑
|
||||
The default network authentication suite of protocols for Windows NT 4.0. It is considered insecure and was replaced by NTLMv2. | show 🗑
|
||||
An anonymous connection to an administrative share (IPC$) on a Windows machine. This session can allow for enumeration of a Windows machine, among other attacks. | show 🗑
|
||||
show | Open Source
🗑
|
||||
A network architecture framework, Developed by the ISO. It describes the communications process between two systems across the Internet. | show 🗑
|
||||
show | Operating System Attack
🗑
|
||||
Transmission using channels or frequencies outside those normally used for data transfer: often used for error reporting. | show 🗑
|
||||
show | Overt Channel
🗑
|
||||
show | Packet
🗑
|
||||
Controlling access to a network by analyzing the headers of incoming and outgoing packets. Packets will be discarded or allowed to pass through based on rule sets enacted by a network administrator. | show 🗑
|
||||
A utility that uses an ICMP Echo message to determine if a specific IP address is accessible. If the message receives a reply, the address is reachable. | show 🗑
|
||||
An attack where the hacker manipulates parameters within a URL string in hopes of modifying data. | show 🗑
|
||||
show | Passive Attack
🗑
|
||||
This simple PPP authentication method sends clear text username and passwords to verify against a table listing the authoized users. | show 🗑
|
||||
show | Patch
🗑
|
||||
show | Payload
🗑
|
||||
The method of evaluating the security of a computer system or network by simulating an attack from a malicious source. | show 🗑
|
||||
The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information -- usually via a carefully crafted email message. | show 🗑
|
||||
Security measures, such as a locked door, perimeter fence, or security guards. Used to prevent or deter physical access to facilities and physical media. | show 🗑
|
||||
When an authorized person allows someone to pass through a secure door behind them without using an access card, pin or biometrics, thereby bypassing physical security measures. | show 🗑
|
||||
show | Ping Sweep
🗑
|
||||
A virus that changes each time it runs. It uses a _____ engine to change the code but keeps the function intact. | show 🗑
|
||||
Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits. | show 🗑
|
||||
show | PPTP (Point-to-Point Tunneling Protocol)
🗑
|
||||
show | GRE (Generic Routing Encapsulation)
🗑
|
||||
A technology where multiple internal IP addresses on a network are hidden behind one advertised Public IP address. A many-to-one NAT. | show 🗑
|
||||
show | Port Scanning
🗑
|
||||
show | Port Knocking
🗑
|
||||
Directing a protocol from one port to another port. | show 🗑
|
||||
An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET command. | show 🗑
|
||||
show | POP3 (Post Office Protocol)
🗑
|
||||
show | Presentation Layer
🗑
|
||||
A data encryption/decryption program often used for e-mail and file storage. | show 🗑
|
||||
show | Private Key
🗑
|
||||
show | Private Network Address
🗑
|
||||
The configuration of a network card that makes the card pass all traffic it receives to the CPU. Windows uses WinPcap. Linux uses libcap. | show 🗑
|
||||
A formal set of rules describing data transmission, especially across a network. It will determin the type of error checking, data compression methods and how systems will indicate completion of send and receipt. | show 🗑
|
||||
A set of related communications protocols operating together as a group. Think OSI Reference model. | show 🗑
|
||||
A device set up to send a response on behalf of an end node to the requesting host. Generally used to hide the host from the Internet. | show 🗑
|
||||
The shared key in an asymmetric key pair. Typically used to encrypt data or verify signatures. | show 🗑
|
||||
A set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
infotech
Popular Computers sets