Certified Ethical Hacker Terms & Definitions - T U V W X Z - info tech
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
show | TACAS (Terminal Access Controller Access-Control System)
🗑
|
||||
The software product or computer system that is the subject of an evaluation. | show 🗑
|
||||
show | Telnet
🗑
|
||||
show | TKIP (Temporal Key Integrity Protocol)
🗑
|
||||
Any circumstance or event with the potential to adversely impact an organizations operations, assets or individuals through an information system. | show 🗑
|
||||
show | Three-Way (TCP) Handshake
🗑
|
||||
show | Tiger Team
🗑
|
||||
A program designed to execute at a specific time to release malicious code onto a computer system or network. | show 🗑
|
||||
A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded. | show 🗑
|
||||
show | Timestamping
🗑
|
||||
show | Tini
🗑
|
||||
show | Traceroute
🗑
|
||||
A connection-oriented, layer 4 protocol for transporting data over network segments. It's considered reliable because it guarantees delivery and proper reordering of packets. Used for long haul traffic on the internet. | show 🗑
|
||||
show | TLS (Transport Layer Security)
🗑
|
||||
show | Trojan Horse
🗑
|
||||
show | TCB (Trusted Computer Base)
🗑
|
||||
show | TCSEC (Trusted Computer System Evaluation Criteria)
🗑
|
||||
The act of using numerous electronic serial numbers on a cell phone until a valid number is located. | show 🗑
|
||||
A point-to-point connection between two endpoints created to exchange data. Typically it's either an encrypted connection or a connection using a protocol in a method for wihch it was not designed. | show 🗑
|
||||
show | Tunneling
🗑
|
||||
A self-replicating malicious program that attempts installation beneath antivirus sofware by directly intercepting the interrupt handlers of the operating system to evade detection. | show 🗑
|
||||
show | Unicode
🗑
|
||||
show | URL (Uniform Resouce Locator)
🗑
|
||||
A connectionless, layer 4 transport protocol. Faster that TCP but offers no reliability. It's on a best effort basis. Used where a small amount of packet loss is acceptable, such as streaming video and audio. | show 🗑
|
||||
Devices, connected to multiple switches and routers, grouped 'logically' into broadcast domains regardless of there physical location. | show 🗑
|
||||
show | VPN (Virtual Private Network)
🗑
|
||||
show | Virus
🗑
|
||||
An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users. | show 🗑
|
||||
show | Vulnerability
🗑
|
||||
show | Vulnerability Assessment
🗑
|
||||
show | Vulnerability Management
🗑
|
||||
Sending packets or requests to another system to gain information to be used to identify weaknesses and protect the system from attacks. | show 🗑
|
||||
show | War Chalking
🗑
|
||||
The act of dialing all numbers within an organization to discover open modems. | show 🗑
|
||||
The act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable device. | show 🗑
|
||||
show | Warm Site
🗑
|
||||
show | Web Spider
🗑
|
||||
show | White Box Testing
🗑
|
||||
A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address, or an autonomous system. | show 🗑
|
||||
show | WAN (Wide Area Network)
🗑
|
||||
A security protocol for wireless local area networks defined in the 802.11b standard, intended to provide the same level of security as a wired LAN. | show 🗑
|
||||
Provides data encryption for IEEE 802.11 wireless networks so data can only be decrypted by the intended recipients. | show 🗑
|
||||
show | Wiretapping
🗑
|
||||
A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself. | show 🗑
|
||||
show | Wrapper
🗑
|
||||
show | Written Authorization
🗑
|
||||
show | XOR Operation
🗑
|
||||
show | Zenmap
🗑
|
||||
show | Zombie
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
infotech
Popular Computers sets