CEH Deck 5 Flashcards

Continue with Glossary definitions

1
Q

Active Directory (AD)

A

The directory service created by Microsoft for use on its networks.

It provides a variety of network services using Lightweight Directory Access Protocol (LDAP), Kerberos-based authentication, and single sign-on for user access to network-based resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

active fingerprinting

A

Injecting traffic into the network to identify the operating system of a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ad hoc mode

A

A mode of operation in a wireless LAN in which clients send data directly to one another without utilizing a wireless access point (WAP), much like a point-to-point wired connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

adware

A

Software that has advertisements embedded within it. It generally displays ads in the form of pop-ups.
on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

black-box testing

A

In penetration testing, a method of testing the security of a system or subnet without any previous knowledge of the device or network.

It is designed to simulate an attack by an outside intruder (usually from the Internet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

block cipher

A

A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key.

For a block cipher algorithm, the length of the input block is the same as the length of the output block.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Blowfish

A

A symmetric, block-cipher data-encryption standard that uses a variable-length key that can range from 32 bits to 448 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BlueBorne attack

A

An amalgamation of techniques and attacks against known, already existing Bluetooth vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

cloning

A

A cell phone attack in which the serial number from one cell phone is copied to another in an effort to copy the cell phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CNAME record

A

A Canonical Name record within DNS, used to provide an alias for a domain name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

cold site

A

A backup facility with the electrical and physical components of a computer facility, but with no computer equipment in place.

The site is ready to receive the necessary replacement computer equipment in the event the user has to move from his main computing location to an alternate site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

daemon

A

A background process found in Unix, Linux, Solaris, and other Unix-based operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

demilitarized zone (DMZ)

A

A partially protected zone on a network, not exposed to the full fury of the Internet but not fully behind the firewall. This technique is typically used on parts of the network that must remain open to the public (such as a web server) but must also access trusted resources (such as a database). The point is to allow the inside firewall component, guarding the trusted resources, to make certain assumptions about the impossibility of outsiders forging DMZ addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

denial of service (DoS)

A

An attack with the goal of preventing authorized users from accessing services and preventing the normal operation of computers and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

encryption

A

Conversion of plain text to cipher text through the use of a cryptographic algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

end user licensing agreement (EULA)

A

A software license agreement; a contract between the “licensor” and purchaser establishing the right to use the software.

17
Q

Enterprise Information Security Architecture (EISA)

A

A collection of requirements and processes that help determine how an organization’s information
systems are built and how they work.

18
Q

File Transfer Protocol (FTP)

A

An Application layer protocol, using TCP, for transporting files across an Internet connection. FTP transmits in clear text.

19
Q

filter

A

A set of rules defined to screen network packets based on source address, destination address, or protocol. These rules determine whether the packet will be forwarded or discarded.

20
Q

Finger

A

An early network application that provides information on users currently logged on to a machine.

21
Q

Hierarchical File System (HFS)

A

A file system used by macOS.

22
Q

honeynet

A

A network deployed as a trap to detect, deflect, or deter unauthorized use of information systems.

23
Q

honeypot

A

A host designed to collect data on suspicious activity.

24
Q

hot site

A

A fully operational off-site data-processing facility equipped with hardware and system software to be used in the event of a disaster.

25
Q

information technology (IT) infrastructure

A

The combination of all IT assets, resources, components, and systems.

26
Q

information technology (IT) security architecture and framework

A

A document describing information security guidelines, policies, procedures, and standards.

27
Q

Information Technology Security Evaluation Criteria (ITSEC)

A

A structured set of criteria
for evaluating computer security within products and systems produced by European countries; it has been largely replaced by the Common Criteria.