14 d4 hw Flashcards
An ___ takes advantage of a system or applications vulnerability.
exploit
Nmap switch option “-sA” performs ___ Scan.
ACK Stealth
The ___ ___ Act of ___ modernized US Cybercrime legislation and mandates life sentences for offenders.
CyberSecurity Enhancement Act of 2002
___ Scan sends packets with FIN, URG, and PSH control flags set.
TCP Xmas Tree
___ is an entity that sees all messages, but is unable to modify them; is able to inject new messages.
Man-on-the-side
Title 18 ___ safeguards computers from fraud and related activities.
USC 1030
Nmap switch option ___ is an active fingerprinting method that performs OS detection.
-o
A ___ is caused when applications are allowed to write beyond allocated memory due to lack of input validation.
buffer overflow
___ represents an entity that sits between systems to observe and modify data.
man-in-the-middle
___ is used in Linux to provide interactive monitoring of active processes.
Top
___ is a simple offline password cracking tool found on Kali.
John the Ripper
___ is a troubleshooting tool used to determine if a host is reachable.
ping
___ fingerprinting is also known as TCP stack fingerprinting.
Passive OS fingerprinting
SYN ___ Scan is also known as half-open scan.
Stealth
___ is used in UNIX to clean from binary files.
Zap3