CEH Deck 3 Flashcards

Coninue Glossary decks

1
Q

hash

A

A unique numerical string, created by a hashing algorithm on a given piece of data, used to verify data integrity.

Generally hashes are used to verify the integrity of files after download (comparison to the hash value on the site before download) and/or to store password values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

heuristic scanning

A

Method used by antivirus software to detect new, unknown viruses that have not yet been identified; based on a piece-by-piece examination of a program, heuristic scanning looks for a sequence or sequences of instructions that differentiate the virus from “normal” programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

hashing algorithm

A

A one-way mathematical function that generates a fixed-length numerical string (hash) from a given data input. MD5 and SHA-1 are hashing algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Host-based IDS (HIDS)

A

Host-based IDS. An IDS that resides on the host, protecting against file and folder manipulation and other host-based attacks and actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

information technology (IT) asset criticality

A

The level of importance assigned to an IT asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

information technology (IT) asset valuation

A

The monetary value assigned to an IT asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

inference attack

A

An attack in which the hacker can derive information from the cipher text without actually decoding it.

Sensitive information can be considered compromised if an adversary can infer its real value with a high level of confidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lightweight Directory Access Protocol (LDAP)

A

An industry-standard protocol used for accessing and managing information within a directory service; an application protocol for querying and modifying data using directory services running over TCP/IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

limitation of liability and remedies

A

A legal limit on the amount of financial liability and remedies the organization is responsible for taking on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

local area network (LAN)

A

A computer network confined to a relatively small area, such as a single building or campus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

logic bomb

A

A piece of code intentionally inserted into a software system that will perform a malicious function when specified conditions are met at some future point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

malware

A

A program or piece of code inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system.

Malware consists of viruses, worms, and other malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

mandatory access control (MAC)

A

A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (that is, clearance) of users to access information of such sensitivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

man-in-the-middle attack

A

An attack where the hacker positions himself between the client and the server to intercept (and sometimes alter) data traveling between the two.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

mantrap

A

A small space having two sets of interlocking doors; the first set of doors must close before the second set opens.

Typically authentication is required for each door, often using different factors.

For example, a smartcard may open the first door, and a personal identification number entered on a number pad opens the second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

network access server

A

A device providing temporary, on-demand, point-to-point network access to users.

17
Q

Network Address Translation (NAT)

A

A technology where you advertise one IP address externally and data packets are rerouted to the appropriate IP address inside your network by a device providing translation services.

In this way, IP addresses of machines on your internal network are hidden from external users.

18
Q

Network Basic Input/Output System (NetBIOS)

A

An API that provides services related to the OSI model’s Session layer, allowing applications on separate computers to communicate over a LAN.

19
Q

operating system attack

A

An attack that exploits the common mistake many people make when installing operating systems—that is, accepting and leaving all the defaults.

20
Q

out-of-band signaling

A

Transmission using channels or frequencies outside those normally used for data transfer; often used for error reporting.

21
Q

outsider associate

A

A untrusted outsider using open, or illicitly gained, access to an organization’s resources.

22
Q

overt channel

A

A communications path, such as the Internet, authorized for data transmission within a computer system or network.

23
Q

Packet Internet Groper (ping)

A

A utility that sends an ICMP Echo message to determine whether a specific IP address is accessible; if the message receives a reply, the address is reachable.

24
Q

parameter tampering

A

An attack where the hacker manipulates parameters within the URL string in hopes of modifying data.

25
Q

passive attack

A

An attack against an authentication protocol in which the attacker intercepts data in transit along the network between the claimant and verifier but does not alter the data (in other words, eavesdropping).

26
Q
A