Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Certified Ethical Hacker Terms & Definitions - K, L, M, N, O & P - info tech

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
An authentication protocol that uses tickets, Ticket Granting Service and a Key Distribution Center. Developed at MIT (Massachusetts Institute of Technology).   show
🗑
show KEP (Key Exchange Protocol)  
🗑
show Keylogger  
🗑
show LIFO (Last in First Out)  
🗑
show Level I Assessment  
🗑
show Level II Assessment  
🗑
show Level III Assessment  
🗑
show Limits of Liability  
🗑
show LAN (Local Area Network)  
🗑
A piece of malicious code inserted into a software system that will perform a malicious function when the specified conditions are met at some future point.   show
🗑
A method of only permitting preapproved MAC addresses to access the network. All non-matching MAC addresses are blocked.   show
🗑
show Macro Virus  
🗑
show Malicious Code (or Malware)  
🗑
An attack where the hacker positions himself between the client and the server in order to intercept data traveling between the two.   show
🗑
show Mandatory Access Control  
🗑
show Mantrap  
🗑
A hashing algorithm that results in a 128-bit output.   show
🗑
This sublayer of Layer 2 (Data Link) OSI reference model, emulates a full duplex logical communication channel in a multi-point network.   show
🗑
show Methodology  
🗑
A computer virus that infects and spreads in multiple ways.   show
🗑
show MIME (Multipurpose Internet Mail Extensions)  
🗑
show National Security Agency INFOSEC Assessment Methodology  
🗑
A free, open source version of the Berkeley Software Distribution of Unix, often used in embedded systems.   show
🗑
A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware.   show
🗑
A Device providing temporary, on-demand, point-to-point network access to users.   show
🗑
The process of modifying IP packet headers while in transit across a traffic routing device. Provides one-to-one translation of IP addresses.   show
🗑
show NetBIOS  
🗑
An adapter that provides the physical connection to send and receive data between the computer and the network media.   show
🗑
One or more locations from which control is exercised over a computer or telecommunications network.   show
🗑
show Network Tap  
🗑
A device on a network.   show
🗑
show Non-Repudiation  
🗑
show NOP (nope sled)  
🗑
A commond-line tool available for many operating systems for querying of the Domain Name System (DNS) to obtain domain name or IP address records.   show
🗑
The default network authentication suite of protocols for Windows NT 4.0. It is considered insecure and was replaced by NTLMv2.   show
🗑
An anonymous connection to an administrative share (IPC$) on a Windows machine. This session can allow for enumeration of a Windows machine, among other attacks.   show
🗑
show Open Source  
🗑
A network architecture framework, Developed by the ISO. It describes the communications process between two systems across the Internet.   show
🗑
show Operating System Attack  
🗑
Transmission using channels or frequencies outside those normally used for data transfer: often used for error reporting.   show
🗑
show Overt Channel  
🗑
show Packet  
🗑
Controlling access to a network by analyzing the headers of incoming and outgoing packets. Packets will be discarded or allowed to pass through based on rule sets enacted by a network administrator.   show
🗑
A utility that uses an ICMP Echo message to determine if a specific IP address is accessible. If the message receives a reply, the address is reachable.   show
🗑
An attack where the hacker manipulates parameters within a URL string in hopes of modifying data.   show
🗑
show Passive Attack  
🗑
This simple PPP authentication method sends clear text username and passwords to verify against a table listing the authoized users.   show
🗑
show Patch  
🗑
show Payload  
🗑
The method of evaluating the security of a computer system or network by simulating an attack from a malicious source.   show
🗑
The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information -- usually via a carefully crafted email message.   show
🗑
Security measures, such as a locked door, perimeter fence, or security guards. Used to prevent or deter physical access to facilities and physical media.   show
🗑
When an authorized person allows someone to pass through a secure door behind them without using an access card, pin or biometrics, thereby bypassing physical security measures.   show
🗑
show Ping Sweep  
🗑
A virus that changes each time it runs. It uses a _____ engine to change the code but keeps the function intact.   show
🗑
Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits.   show
🗑
show PPTP (Point-to-Point Tunneling Protocol)  
🗑
show GRE (Generic Routing Encapsulation)  
🗑
A technology where multiple internal IP addresses on a network are hidden behind one advertised Public IP address. A many-to-one NAT.   show
🗑
show Port Scanning  
🗑
show Port Knocking  
🗑
Directing a protocol from one port to another port.   show
🗑
An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET command.   show
🗑
show POP3 (Post Office Protocol)  
🗑
show Presentation Layer  
🗑
A data encryption/decryption program often used for e-mail and file storage.   show
🗑
show Private Key  
🗑
show Private Network Address  
🗑
The configuration of a network card that makes the card pass all traffic it receives to the CPU. Windows uses WinPcap. Linux uses libcap.   show
🗑
A formal set of rules describing data transmission, especially across a network. It will determin the type of error checking, data compression methods and how systems will indicate completion of send and receipt.   show
🗑
A set of related communications protocols operating together as a group. Think OSI Reference model.   show
🗑
A device set up to send a response on behalf of an end node to the requesting host. Generally used to hide the host from the Internet.   show
🗑
The shared key in an asymmetric key pair. Typically used to encrypt data or verify signatures.   show
🗑
A set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates.   show
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: infotech
Popular Computers sets