Certified Ethical Hacker Terms & Definitions - T U V W X Z - info tech
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks. | show 🗑
|
||||
The software product or computer system that is the subject of an evaluation. | show 🗑
|
||||
show | Telnet
🗑
|
||||
A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware. | show 🗑
|
||||
show | Threat
🗑
|
||||
A three-step process computers execute to negotiate a connection with each other. The steps are: SYN, SYN/ACK, ACK. | show 🗑
|
||||
show | Tiger Team
🗑
|
||||
A program designed to execute at a specific time to release malicious code onto a computer system or network. | show 🗑
|
||||
show | TTL (Time To Live)
🗑
|
||||
Recording the time, normally in a log file, when an event happens or when information is created or modified. | show 🗑
|
||||
show | Tini
🗑
|
||||
show | Traceroute
🗑
|
||||
A connection-oriented, layer 4 protocol for transporting data over network segments. It's considered reliable because it guarantees delivery and proper reordering of packets. Used for long haul traffic on the internet. | show 🗑
|
||||
A standard for ecrypting email, web pages and other stream-oriented information transmitted over the Internet. | show 🗑
|
||||
show | Trojan Horse
🗑
|
||||
show | TCB (Trusted Computer Base)
🗑
|
||||
A U.S. Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system. | show 🗑
|
||||
The act of using numerous electronic serial numbers on a cell phone until a valid number is located. | show 🗑
|
||||
show | Tunnel
🗑
|
||||
show | Tunneling
🗑
|
||||
show | Tunneling Virus
🗑
|
||||
show | Unicode
🗑
|
||||
show | URL (Uniform Resouce Locator)
🗑
|
||||
A connectionless, layer 4 transport protocol. Faster that TCP but offers no reliability. It's on a best effort basis. Used where a small amount of packet loss is acceptable, such as streaming video and audio. | show 🗑
|
||||
Devices, connected to multiple switches and routers, grouped 'logically' into broadcast domains regardless of there physical location. | show 🗑
|
||||
show | VPN (Virtual Private Network)
🗑
|
||||
A malicious computer program with self-replication capabilities that attaches to a file and moves with the host from one computer to another. | show 🗑
|
||||
An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users. | show 🗑
|
||||
A weakness in an information system or its security controls that could be exploited or triggered by a threat source. | show 🗑
|
||||
show | Vulnerability Assessment
🗑
|
||||
The cyclical practice of identifying, classifying, remediating and mitigating vulnerabilities. | show 🗑
|
||||
Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks. | show 🗑
|
||||
show | War Chalking
🗑
|
||||
show | War Dialing
🗑
|
||||
show | War Driving
🗑
|
||||
An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption. | show 🗑
|
||||
A program designed to browse websites in an automated, methodical manner. Sometimes these programs are used to harvest information from websites, such as e-mail addresses. | show 🗑
|
||||
show | White Box Testing
🗑
|
||||
A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address, or an autonomous system. | show 🗑
|
||||
Two or more LANs connected by a high-speed line across a large geographical area. | show 🗑
|
||||
show | WEP (Wired Equivalent Privacy)
🗑
|
||||
Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients. | show 🗑
|
||||
Monitoring of telephone or Internet conversations, typically by covert meams. | show 🗑
|
||||
show | Worm
🗑
|
||||
Software used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed. | show 🗑
|
||||
show | Written Authorization
🗑
|
||||
A mathematical operation requiring two binary inputs: If the inputs match, the output is a 0, otherwise it is a 1. | show 🗑
|
||||
show | Zenmap
🗑
|
||||
show | Zombie
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
infotech
Popular Computers sets