CEH Glossary Deck 2 Flashcards

provide additional definitions from CEH

1
Q

access point (AP)

A

A wireless LAN device that acts as a central point for all wireless traffic.

The AP is connected to both the wireless LAN and the wired LAN, providing wireless clients access to network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

accountability

A

The ability to trace actions performed on a system to a specific user or system entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

acknowledgment (ACK)

A

A TCP flag notifying an originating station that the preceding packet (or packets) has been received.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

active attack

A

An attack that is direct in nature—usually where the attacker injects something into, or otherwise alters, the network or system target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

bastion host

A

A computer placed outside a firewall to provide public services to other Internet sites and hardened to resist external attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

biometrics

A

A measurable, physical characteristic used to recognize the identity, or to verify the claimed identity, of an applicant.

Facial images, fingerprints, and handwriting samples are all examples of biometrics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

bit flipping

A

A cryptographic attack where bits are manipulated in the cipher text to generate a predictable outcome in the plain text once it is decrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Challenge Handshake Authentication Protocol (CHAP)

A

An authentication method on point-to-point links, using a three-way handshake and a mutually agreed-upon key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CIA triad

A

Confidentiality, integrity, and availability. These are the three fundamental aspects of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

cipher text

A

Text or data in its encrypted form; the result of plain text being input into a cryptographic algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

client

A

A computer process that requests a service from another computer and accepts the server’s responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

database

A

An organized collection of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

decryption

A

The process of transforming cipher text into plain text through the use of a cryptographic algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

defense in depth

A

An information assurance strategy in which multiple layers of defense are placed throughout an information technology system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Electronic Code Book (ECB)

A

A mode of operation for a block cipher, with the characteristic that each possible block of plain text has a defined corresponding cipher-text value, and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

electronic serial number

A

Created by the U.S. Federal Communications Commission to uniquely identify mobile devices; often represented as an 11-digit decimal number or 8-digit hexadecimal number.

17
Q

encapsulation

A

The process of attaching a particular protocol header and trailer to a unit of data before transmission on the network.

It occurs at Layer 2 of the OSI reference model.

18
Q

Fast Ethernet

A

An Ethernet networking system transmitting data at 100 million bits per second (Mbps), ten times the speed of an earlier Ethernet standard.

Derived from the Ethernet 802.3 standard, it is also known as 100BaseT.

19
Q

Fiber Distributed Data Interface (FDDI)

A

LAN standard, defined by ANSI X3T9.5, specifying a 100-Mbps token-passing network using fiber-optic cable and a dual-ring architecture for redundancy, with transmission distances of up to 2 kilometers.

20
Q

File Allocation Table (FAT)

A

A computer file system architecture used in Windows, OS/2, and most memory cards.

21
Q

Government Access to Keys (GAK)

A

An attempt through key disclosure laws to have software companies provide copies of all keys to the government, which will be used only when a warrant is provided during law enforcement efforts.

22
Q

gray hat

A

A skilled hacker who straddles the line between white hat (hacking only with permission and within guidelines) and black hat (malicious hacking for personal gain).

Gray hats sometime perform illegal acts to exploit technology with the intent of achieving better security.

23
Q

gray-box testing

A

A penetration test in which the ethical hacker has limited knowledge of the intended target(s).

Designed to simulate an internal but non-system-administrator-level attack.