CEH Deck 6 Flashcards
Learn Glossary definitions (13 cards)
infrastructure mode
A wireless networking mode where all clients connect to the wireless network through a central access point.
initial sequence number (ISN)
A number assigned during TCP startup sessions that tracks how much information has been moved. This number is used by hackers when hijacking sessions.
insider affiliate
A spouse, friend, or client of an employee who uses the employee’s credentials to gain physical or logical access to organizational resources.
Walker, Matt. CEH Certified Ethical Hacker Bundle, Fourth Edition . McGraw-Hill Education. Kindle Edition.
insider associate
A person with limited authorized access to the organization; contractors, guards, and cleaning services are all examples.
master boot record infector
A virus designed to infect the master boot record.
maximum tolerable downtime (MTD)
A measurement of the potential cost due to a particular asset being unavailable, used as a means to prioritize the recovery of assets should the worst occur.
MD5
A hashing algorithm that results in a 128-bit output.
Media Access Control (MAC)
A sublayer of Layer 2 of the OSI model, the Data Link layer. It provides addressing and channel access control mechanisms that enable several terminals or network nodes to communicate within a multipoint network.
network interface card (NIC)
An adapter that provides the physical connection to send and receive data between the computer and the network media.
network operations center (NOC)
One or more locations from which control is exercised over a computer, television broadcast, or telecommunications network.
network tap
Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a network-based IDS (NIDS) to monitor all traffic.
Nmap
An open source scanning utility used to discover hosts and services on a network.
Password Authentication Protocol (PAP)
A simple PPP authentication mechanism in which the user name and password are transmitted in clear text to prove identity. PAP compares the user name and password to a table listing authorized users.