TERM Flashcards

1
Q

FRR

A

false rejection rate, good user that is rejected by biometric system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FAR

A

false acceptance rate, wrong user that is accepted by biometric system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CER

A

crossover error rate: the less, the more for a biometric system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HYDRA

A

cracking tools (dictionnary attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Horsepill

A

linux kernel rootkit inside initrd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Grayfish

A

windows rootkit inject code in the boot record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

<= 7 car. for LM password, what is the end ?

A

AAD3B435B51404EE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Azazel

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Avatar

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Necurs

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ZeroAccess

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Pharming

A

use dns poisoning / host conf to redirect victim to attacker phishing site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

spear phishing

A

a targeted phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

watering hole attack

A

hack a website that victim corporate used to connect into in order to do phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

whaling

A

phishing against CEO or person of interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

VANET

A

Vehicle Ad Hoc Network, communication vechicle-to-vehicle (V2V)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Mirai

A

IoT malware, botnet and DDos attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

foren6

A

tools for sniffing IoT device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SuperOneClick

A

tools to root android devices

20
Q

ALE = ____ * ____

21
Q

THOR

A

full APT scanner

22
Q

Diffie Hellman group:

A
  • group 1: 768bit
  • group 2: 1024bit
  • group 5: 1536bit
  • group 14: 2048bit
23
Q

key escrow

A

enable a third party to access sensitive data if the needed arrive

24
Q

RUDY

A

keeping sessions as long as possible

25
LAND attack
DoS attack that use a malformed packet
26
teardrop
DoS attack that use several large overlapping IP Fragment
27
smurf attack
spoof victim and got back multiple ICMP reply, DoS
28
ping of death
ICMP too big, so after frag, the system crash
29
blackboard
recognize spam with AI
30
cavity virus
use the unused part of a file
31
sparse virus
launch on trigger (like day, number of use, etc)
32
dhcp starvation
full of ip leases, so the dhcp can't be working
33
BIA
Business Impact Analysis ⇒ identify business system and process, that are critical for a company to continue to operate
34
MTD
Maximum Tolerable Downtime
35
Common Criteria, what is "ST" ?
Security Target : is the DOCUMENTATION for a system or product that is to be tested
36
Common Criteria, what is "ToE" ?
Target of Evaluation ==> the system to test
37
Hyena tools
used to enumeration system (like netbios)
38
utmp file ?
currently logs user
39
btmp file ?
failed login attempt
40
wtmp file ?
login/logout activity
41
cache poisoning
DNS poisoning
42
risk equation = ________
vulnerability (likelihood of appearing) * threat (frequency) * cost
43
dimitry
opensource network scanning utility
44
p0f
passive os fingerprint - Passive Os Fingerprint = p0f
45
wich fw does operate at layer 5 ?
circuit-level gateway firewall
46
program slicing ?
deobfuscation method
47
nemesys
command line tools that generate arp, ethernet, tcp and udp packet