Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Certified Ethical Hacker Terms & Definitions - K, L, M, N, O & P - info tech

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
An authentication protocol that uses tickets, Ticket Granting Service and a Key Distribution Center. Developed at MIT (Massachusetts Institute of Technology).   Kerberos  
🗑
A cryptography method in which cryptographic keys are exchanged between users, allowing the use of a cryptographic algorithm (i.e., Diffe-Hellman)   KEP (Key Exchange Protocol)  
🗑
Software or Hardware application or device that captures and records a user's keystokes.   Keylogger  
🗑
A programming principle where the last piece of data added to the stack is the first piece of data taken off.   LIFO (Last in First Out)  
🗑
An evaluation which consists of interviews, Document reviews and demonstrations. There are no hands-on testing.   Level I Assessment  
🗑
An evaluation which consisists of interviews, document reviews, demonstrations, vulnerability scans and hands-on testing.   Level II Assessment  
🗑
An evaluation where testers attempt to penetrate the network.   Level III Assessment  
🗑
A legal limit on the amount of financial liability and remedies an organization is responsible for taking on.   Limits of Liability  
🗑
A computer network confined to a relatively small area, such as a single building or campus.   LAN (Local Area Network)  
🗑
A piece of malicious code inserted into a software system that will perform a malicious function when the specified conditions are met at some future point.   Logic Bomb  
🗑
A method of only permitting preapproved MAC addresses to access the network. All non-matching MAC addresses are blocked.   MAC Filtering  
🗑
A virus written in a (_blank_) language that is usually embedded in documents and spreadsheet files.   Macro Virus  
🗑
Software or firmware intended to perform unauthorized processes that impact the CIA of an information system. Can be a virus, worm, Trojan, logic bomb, etc.   Malicious Code (or Malware)  
🗑
An attack where the hacker positions himself between the client and the server in order to intercept data traveling between the two.   Man-in-the-middle Attack  
🗑
In this configuration, access to system resources are controlled by a security policy administrator. Users do not have the ability to override policy and grant access to files.   Mandatory Access Control  
🗑
A small space between two sets of interlocking doors. The first door must close before the second door opens. Separate authentication for each door is typically required.   Mantrap  
🗑
A hashing algorithm that results in a 128-bit output.   MD5  
🗑
This sublayer of Layer 2 (Data Link) OSI reference model, emulates a full duplex logical communication channel in a multi-point network.   Media Access Control (MAC)  
🗑
A documented process for a procedure designed to be consistent, repeatable, and accountable.   Methodology  
🗑
A computer virus that infects and spreads in multiple ways.   Multipartite Virus  
🗑
An extensible mechanism for e-mail. Varieties exist for sending content such as audio, binary, or video using SMTP (Simple Mail Transfer Protocol)   MIME (Multipurpose Internet Mail Extensions)  
🗑
A systematic process for the assessment of security vulnerabilities. NSA IAM   National Security Agency INFOSEC Assessment Methodology  
🗑
A free, open source version of the Berkeley Software Distribution of Unix, often used in embedded systems.   NetBSD  
🗑
A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.   NetBus  
🗑
A Device providing temporary, on-demand, point-to-point network access to users.   Network Access Server  
🗑
The process of modifying IP packet headers while in transit across a traffic routing device. Provides one-to-one translation of IP addresses.   NAT (Network Address Translation)  
🗑
An API that provides services related to the OSI model's Session Layer, allowing applications on separate computers to communicate over a LAN.   NetBIOS  
🗑
An adapter that provides the physical connection to send and receive data between the computer and the network media.   NIC (Network Interface Card)  
🗑
One or more locations from which control is exercised over a computer or telecommunications network.   NOC (Network Operations Center)  
🗑
Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic.   Network Tap  
🗑
A device on a network.   Node  
🗑
The result of the utilization of digital certificates, whereby the identity of the sender of a message cannot be denied.   Non-Repudiation  
🗑
A command that instructs the system to do nothing. Many overflow attacks involve this command as a series of stringed operators (known as a ____ Sled)   NOP (nope sled)  
🗑
A commond-line tool available for many operating systems for querying of the Domain Name System (DNS) to obtain domain name or IP address records.   nslookup  
🗑
The default network authentication suite of protocols for Windows NT 4.0. It is considered insecure and was replaced by NTLMv2.   NT LAN Manager (NTLM)  
🗑
An anonymous connection to an administrative share (IPC$) on a Windows machine. This session can allow for enumeration of a Windows machine, among other attacks.   Null Session  
🗑
The practice in development of software products that allows access and modification by any would be developer.   Open Source  
🗑
A network architecture framework, Developed by the ISO. It describes the communications process between two systems across the Internet.   Open System Interconnection (OSI) Reference Model  
🗑
An attack that exploits the common mistake many people make when installing operating systems, which is, accepting and leaving all of the system defaults as is.   Operating System Attack  
🗑
Transmission using channels or frequencies outside those normally used for data transfer: often used for error reporting.   Out-of-band Signaling  
🗑
A communications path, such as the Internet, authorized for data transmission within a computer system or network.   Overt Channel  
🗑
A unit of information formatted according to specific protocols that allows for the precise transmission of data from one network node to another. Also called a datagram.   Packet  
🗑
Controlling access to a network by analyzing the headers of incoming and outgoing packets. Packets will be discarded or allowed to pass through based on rule sets enacted by a network administrator.   Packet Filtering  
🗑
A utility that uses an ICMP Echo message to determine if a specific IP address is accessible. If the message receives a reply, the address is reachable.   Packet Internet Groper (Ping)  
🗑
An attack where the hacker manipulates parameters within a URL string in hopes of modifying data.   Parameter Tampering  
🗑
An attack where the attacker intercepts data in transit along the network between the sending and receiving points, but does not alter the data (basically avesdropping).   Passive Attack  
🗑
This simple PPP authentication method sends clear text username and passwords to verify against a table listing the authoized users.   PAP (Password Authentication Protocol)  
🗑
A piece of software intended to update or fix a known problem. Usually provided by the OEM vendor of the program.   Patch  
🗑
The contents of a packet. A system attack requires that the attacker delivers this and it then needs to be executed by the system.   Payload  
🗑
The method of evaluating the security of a computer system or network by simulating an attack from a malicious source.   Penetration Testing  
🗑
The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information -- usually via a carefully crafted email message.   Phishing  
🗑
Security measures, such as a locked door, perimeter fence, or security guards. Used to prevent or deter physical access to facilities and physical media.   Physical Security  
🗑
When an authorized person allows someone to pass through a secure door behind them without using an access card, pin or biometrics, thereby bypassing physical security measures.   Piggybacking  
🗑
The process of pinging each address within a subnet to map potential targets. Very fast but easily detectable.   Ping Sweep  
🗑
A virus that changes each time it runs. It uses a _____ engine to change the code but keeps the function intact.   Polymorphic Virus  
🗑
Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.   PPP (Point-to-Point)  
🗑
A VPN tunneling protocol with encryption. It initiates a tunnel by communicating to the peer on TCP port 1723. A GRE tunnel is initiated to the same peer. GRE packets are encapsulated into IP packets and seen as IP protocol 47.   PPTP (Point-to-Point Tunneling Protocol)  
🗑
Generic Routing Encapsulation (GRE)   GRE (Generic Routing Encapsulation)  
🗑
A technology where multiple internal IP addresses on a network are hidden behind one advertised Public IP address. A many-to-one NAT.   PAT (Port Address Translation)  
🗑
The process of using an application to remotely identify open ports on a system, then verifying if the system will allow connections through these ports.   Port Scanning  
🗑
Another term for Firewalking. Externally testing firewalls for open ports by generating a connection attempt on each port.   Port Knocking  
🗑
Directing a protocol from one port to another port.   Port Redirection  
🗑
An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET command.   POST  
🗑
An application layer protocol used to retrieve email from a remote server over a TCP/IP connection. Utilizes Port 110 and for secure encrypted TLS or SSL connection uses Port 995.   POP3 (Post Office Protocol)  
🗑
Layer 6 of the OSI reference model. This layer makes sure that information sent by the Application layer of the sending system is readable by the Application Layer of the receiving system.   Presentation Layer  
🗑
A data encryption/decryption program often used for e-mail and file storage.   PGP (Pretty Good Privacy)  
🗑
The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. It is one of two keys in the PKI system and is never shared.   Private Key  
🗑
The non-routable IP address range intended for use only within the confines of a single entity. 10.0.0.0, 172.16-31.0.0, 192.168.0.0   Private Network Address  
🗑
The configuration of a network card that makes the card pass all traffic it receives to the CPU. Windows uses WinPcap. Linux uses libcap.   Promiscuous Mode  
🗑
A formal set of rules describing data transmission, especially across a network. It will determin the type of error checking, data compression methods and how systems will indicate completion of send and receipt.   Protocol  
🗑
A set of related communications protocols operating together as a group. Think OSI Reference model.   Protocol Stack  
🗑
A device set up to send a response on behalf of an end node to the requesting host. Generally used to hide the host from the Internet.   Proxy Server  
🗑
The shared key in an asymmetric key pair. Typically used to encrypt data or verify signatures.   Public Key  
🗑
A set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates.   PKI (Public Key Infrastructure)  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: infotech
Popular Computers sets