Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Certified Ethical Hacker Terms & Definitions - T U V W X Z - info tech

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
show TACAS (Terminal Access Controller Access-Control System)  
🗑
The software product or computer system that is the subject of an evaluation.   show
🗑
show Telnet  
🗑
show TKIP (Temporal Key Integrity Protocol)  
🗑
Any circumstance or event with the potential to adversely impact an organizations operations, assets or individuals through an information system.   show
🗑
show Three-Way (TCP) Handshake  
🗑
show Tiger Team  
🗑
A program designed to execute at a specific time to release malicious code onto a computer system or network.   show
🗑
A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.   show
🗑
show Timestamping  
🗑
show Tini  
🗑
show Traceroute  
🗑
A connection-oriented, layer 4 protocol for transporting data over network segments. It's considered reliable because it guarantees delivery and proper reordering of packets. Used for long haul traffic on the internet.   show
🗑
show TLS (Transport Layer Security)  
🗑
show Trojan Horse  
🗑
show TCB (Trusted Computer Base)  
🗑
show TCSEC (Trusted Computer System Evaluation Criteria)  
🗑
The act of using numerous electronic serial numbers on a cell phone until a valid number is located.   show
🗑
A point-to-point connection between two endpoints created to exchange data. Typically it's either an encrypted connection or a connection using a protocol in a method for wihch it was not designed.   show
🗑
show Tunneling  
🗑
A self-replicating malicious program that attempts installation beneath antivirus sofware by directly intercepting the interrupt handlers of the operating system to evade detection.   show
🗑
show Unicode  
🗑
show URL (Uniform Resouce Locator)  
🗑
A connectionless, layer 4 transport protocol. Faster that TCP but offers no reliability. It's on a best effort basis. Used where a small amount of packet loss is acceptable, such as streaming video and audio.   show
🗑
Devices, connected to multiple switches and routers, grouped 'logically' into broadcast domains regardless of there physical location.   show
🗑
show VPN (Virtual Private Network)  
🗑
show Virus  
🗑
An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.   show
🗑
show Vulnerability  
🗑
show Vulnerability Assessment  
🗑
show Vulnerability Management  
🗑
Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks.   show
🗑
show War Chalking  
🗑
The act of dialing all numbers within an organization to discover open modems.   show
🗑
The act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable device.   show
🗑
show Warm Site  
🗑
show Web Spider  
🗑
show White Box Testing  
🗑
A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address, or an autonomous system.   show
🗑
show WAN (Wide Area Network)  
🗑
A security protocol for wireless local area networks defined in the 802.11b standard, intended to provide the same level of security as a wired LAN.   show
🗑
Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients.   show
🗑
show Wiretapping  
🗑
A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself.   show
🗑
show Wrapper  
🗑
show Written Authorization  
🗑
show XOR Operation  
🗑
show Zenmap  
🗑
show Zombie  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: infotech
Popular Computers sets