CEH Glossary 1 Flashcards

Learn key definitions / terms / concepts

1
Q

802.11

A

Wireless LAN standards created by IEEE.

  • 802.11a runs at up to 54 Mbps at 5 GHz,
  • 802.11b runs at up to 11 Mbps at 2.4 GHz,
  • 802.11g runs at up to 54 Mbps at 2.4 GHz, and
  • 802.11n can run upward of 150 Mbps.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.11i

A

A wireless LAN security standard developed by IEEE. Requires Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

acceptable use policy (AUP)

A

Policy stating what users of a system can and cannot do with the organization’s assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

access control list (ACL)

A

A method of defining what rights and permissions an entity has to a given resource.

In networking, access control lists are commonly associated with firewall and router traffic-filtering rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

access creep

A

Occurs when authorized users accumulate excess privileges on a system because of moving from one position to another;

allowances accidentally remain with the account from position to position.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

backdoor

A

A hidden capability in a system or program for bypassing normal computer authentication systems.

A backdoor can be purposeful or the result of malware or other attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

banner grabbing

A

An enumeration technique used to provide information about a computer system;

generally used for operating system identification (also known as fingerprinting).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

baseline

A

A point of reference used to mark an initial state in order to manage change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

cache

A

A storage buffer that transparently stores data so future requests for the same data can be served faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CAM table

A

Content addressable memory table.

A CAM table holds all the MAC-address-to-port mappings on a switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

certificate

A

An electronic file used to verify a user’s identity, providing nonrepudiation throughout the system. It is also known as a digital certificate. I

t is also a set of data that uniquely identifies an entity.

Certificates contain the entity’s public key, serial number, version, subject, algorithm type, issuer, valid dates, and key usage details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

daisy chaining

A

A method of external testing whereby several systems or resources are used together to make an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Encryption Standard (DES)

A

An outdated symmetric cipher encryption algorithm, previously approved by the U.S. government and used by business and civilian government agencies.

DES is no longer considered secure because of the ease with which the entire keyspace can be attempted using modern computing, thus making cracking the encryption easy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Link layer

A

Layer 2 of the OSI reference model.

This layer provides reliable transit of data across a physical link.

The Data Link layer is concerned with physical addressing, network topology, access to the network medium, error detection, sequential delivery of frames, and flow control.

The Data Link layer is composed of two sublayers: the MAC and the LLC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

eavesdropping

A

The act of secretly listening to the private conversations of others without their consent.

This can also be done over telephone lines (wiretapping), e-mail, instant messaging, and other methods of communication considered private.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ECHO reply

A

A type 0 ICMP message used to reply to ECHO requests.

It is used with ping to verify Network layer connectivity between hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

EDGAR database

A

A system used by the Securities and Exchange Commission (SEC) for companies and businesses to transmit required filings and information.

The EDGAR database performs automated collection, validation, indexing, acceptance, and forwarding of submissions by companies and others who are required by law to file forms with the U.S. Securities and Exchange Commission.

The database is freely available to the public via the Internet and is a potential source of information for hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

false acceptance rate (FAR)

A

The rate at which a biometric system will incorrectly identify an unauthorized individual and allow them access (see false negative).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

false negative

A

A situation in which an IDS does not trigger on an event that was an intrusion attempt.

False negatives are considered more dangerous than false positives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

false positive

A

A situation in which an IDS or other sensor triggers on an event as an intrusion attempt, when it was actually legitimate traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

false rejection rate (FRR)

A

The rate at which a biometric system will incorrectly reject an access attempt by an authorized user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

gap analysis

A

A tool that helps a company compare its actual performance with its potential performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

gateway

A

A device that provides access between two or more networks.

Gateways are typically used to connect dissimilar networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

GET

A

A command used in HTTP and FTP to retrieve a file from a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

hack value

A

The idea a hacker holds about the perceived worth or interest in attacking a target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

hacktivism

A

The act or actions of a hacker to put forward a cause or a political agenda, to affect some societal change, or to shed light on something he feels to be a political injustice.

These activities are usually illegal in nature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

halo effect

A

A well-known and well-studied phenomenon of human nature, whereby a single trait influences the perception of other traits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

IaaS

A

Infrastructure as a Service. A cloud computing type providing virtualized computing resources over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

identity theft

A

A form of fraud in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit and other benefits in that person’s name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

impersonation

A

A social engineering effort in which the attacker pretends to be an employee, a valid user, or even an executive to elicit information or access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Kerberos

A

A widely used authentication protocol developed at the Massachusetts Institute of Technology (MIT).

Kerberos authentication uses tickets, a ticket granting service, and a key distribution center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

key exchange protocol

A

A method in cryptography by which cryptographic keys are exchanged between users, thus allowing use of a cryptographic algorithm (for example, the Diffie-Hellman key exchange).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

keylogger

A

A software application or hardware device that captures user keystrokes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

last in first out (LIFO)

A

A programming principle whereby the last piece of data added to the stack is the first piece of data taken off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Level I assessment

A

An evaluation consisting of a document review, interviews, and demonstrations.

No hands-on testing is performed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Level II assessment

A

An evaluation consisting of a document review, interviews, and demonstrations, as well as vulnerability scans and hands-on testing.

37
Q
A
38
Q

Level III assessment

A

An evaluation in which testers attempt to penetrate the network.

39
Q

MAC filtering

A

A method of permitting only MAC addresses in a preapproved list of network access. Addresses not matching are blocked.

40
Q

macro virus

A

A virus written in a macro language and usually embedded in document or spreadsheet files.

41
Q

malicious code

A

Software or firmware intended to perform an unauthorized process that will have an adverse impact on the confidentiality, integrity, or availability of an information system.

A virus, worm, Trojan horse, or other code-based entity that infects a host.

42
Q

National Security Agency (NSA) INFOSEC Assessment Methodology (IAM)

A

A systematic process for the assessment of security vulnerabilities.

43
Q

NetBSD

A

A free, open source version of the Berkeley Software Distribution of Unix, often used in embedded systems.

44
Q

network access server

A

A device providing temporary, on-demand, point-to-point network access to users.

45
Q

NetBus

A

A software program for remotely controlling a Microsoft Windows computer system over a network.

Generally it is considered malware.

46
Q

open source

A

Describes practices in production and development that promote access to the end product’s source materials.

47
Q

Open Source Security Testing Methodology Manual (OSSTMM)

A

A peer-reviewed, formalized methodology of security testing and analysis.

48
Q

Open System Interconnection (OSI) reference model

A

A network architecture framework developed by ISO that describes the communications process between two systems across the Internet in seven distinct layers.

49
Q

OpenBSD

A

A Unix-like computer operating system descending from the BSD. OpenBSD includes a number of security features absent or optional in other operating systems.

50
Q

PaaS Platform as a Service.

A

A cloud computing type geared toward software development, providing a platform that allows subscribers to develop applications without building the infrastructure it would normally take to develop and launch software.

51
Q

packer

A

A crypter that uses compression to pack malware executables into smaller sizes to avoid detection.

52
Q

packet

A

A unit of information formatted according to specific protocols, generally regarded as being used in OSI Layer 3, that allows precise transmittal of data from one network node to another.

Also called a datagram or data packet, a packet contains a header (container) and a payload (contents).

Any IP message larger than 1500 bytes will be fragmented into packets for transmission.

53
Q

packet filtering

A

Controlling access to a network by analyzing the headers of incoming and outgoing packets and letting them pass or discarding them based on rule sets created by a network administrator.

A packet filter allows or denies packets based on destination, source, and/or port.

54
Q

qualitative analysis

A

A nonnumerical, subjective risk evaluation. This is used with qualitative assessment (an evaluation of risk that results in ratings of none, low, medium, or high for the probability).

55
Q

quality of service (QoS)

A

A defined measure of service within a network system—administrators may assign a higher QoS to one host, segment, or type of traffic.

56
Q

quantitative risk assessment

A

Calculations of two components of risk (R): the magnitude of the potential loss (L), and the probability (P) that the loss will occur.

57
Q

queue

A

A backlog of packets stored in buffers and waiting to be forwarded over an interface.

58
Q

RAID (Redundant Array of Independent Disks)

A

Formerly Redundant Array of Inexpensive Disks, RAID is a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit, where data is distributed across the drives in one of several ways, called RAID levels.

59
Q

reconnaissance

A

The steps taken to gather evidence and information on the targets you want to attack.

60
Q

remote access

A

Access by information systems (or users) communicating from outside the information system security perimeter.

61
Q

remote access

A

Access by information systems (or users) communicating from outside the information system security perimeter.

62
Q

remote procedure call (RPC)

A

A protocol that allows a client computer to request services from a server and the server to return the results.

63
Q

SaaS Software as a Service.

A

A type of cloud computing used as a software distribution model.

64
Q

SAM

A

The Security Accounts Manager file in Windows stores all the password hashes for the system.

65
Q

Sarbanes-Oxley Act (SOX)

A

SOX was created to make corporate disclosures more accurate and reliable in order to protect the public and investors from shady behavior. There are 11 titles within SOX.

66
Q

scope creep

A

The change or growth of a project’s scope.

67
Q

TACACS Terminal Access Controller Access-Control System.

A

A remote authentication protocol that is used to communicate with an authentication server commonly used in Unix networks.

68
Q

target of engagement (TOE)

A

The software product or system that is the subject of an evaluation.

69
Q

telnet

A

A protocol used in networking to provide bidirectional, interactive, text-oriented communication facility using a virtual terminal connection.

Commands entered locally are executed on the remote system.

70
Q

Unicode

A

An international encoding standard, working within multiple languages and scripts, that represents each letter, digit, or symbol with a unique numeric value that applies across different platforms.

71
Q

Uniform Resource Locator (URL)

A

A string that represents the location of a web resource—most often a website.

72
Q

User Datagram Protocol (UDP)

A

A connectionless, Layer 4 transport protocol.

UDP is faster than TCP but offers no reliability.

A best effort is made to deliver the data, but no checks and verifications are performed to guarantee delivery.

Therefore, UDP is termed a connectionless protocol. UDP is simpler to implement and is used where a small amount of packet loss is acceptable, such as for streaming video and audio.

73
Q

Vehicle Ad Hoc Network (VANET)

A

The communications network used by IoT-enabled vehicles; refers to the spontaneous creation of a wireless network for vehicle-to-vehicle (V2V) data exchange.

74
Q

Videocipher II Satellite Encryption System

A

The brand name of analog scrambling and de-scrambling equipment for cable and satellite television, invented primarily to keep consumer television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.

75
Q

Videocipher II Satellite Encryption System

A

The brand name of analog scrambling and de-scrambling equipment for cable and satellite television, invented primarily to keep consumer television receive-only (TVRO) satellite equipment from receiving TV programming except on a subscription basis.

76
Q

war chalking

A

Drawing symbols in public places to alert others to an open Wi-Fi network.

War chalking can include the SSIDs, administrative passwords to APs, and other information.

77
Q

war dialing

A

The act of dialing all numbers within an organization to discover open modems.

78
Q

war driving

A

The act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable device.

79
Q

warm site

A

An environmentally conditioned workspace partially equipped with IT and telecommunications equipment to support relocated IT operations in the event of a significant disruption.

80
Q

web spider

A

A program designed to browse websites in an automated, methodical manner.

Sometimes these programs are used to harvest information from websites, such as e-mail addresses.

81
Q

XOR operation

A

A mathematical operation requiring two binary inputs: if the inputs match, the output is a 0; otherwise, it is a 1.

82
Q

Zenmap

A

A Windows-based GUI version of Nmap.

83
Q

zero subnet

A

In a classful IPv4 subnet, this is the network number with all binary 0s in the subnet part of the number. When written in decimal, the zero subnet has the same number as the classful network number.

84
Q

zero-day attack

A

An attack carried out on a system or application before the vendor becomes aware and before a patch or fix action is available to correct the underlying vulnerability.

85
Q

zombie

A

A computer system that performs tasks dictated by an attacker from a remote location. Zombies may be active or idle, and owners of the systems generally do not know their systems are compromised.

86
Q

zone transfer

A

A type of DNS transfer where all records from an SOA are transmitted to the requestor. Zone transfers have two options: full (opcode AXFR) and incremental (IXFR).

87
Q
A
88
Q
A