CEH Deck 4 Flashcards

continue with glossary definitions

1
Q

replay attack

A

An attack where the hacker repeats a portion of a cryptographic cryptographic exchange in hopes of fooling the system into setting up a communications channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

request for comments (RFC)

A

A series of documents and notes on standards used or proposed for use on the Internet; each is identified by a number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

reverse lookup; reverse DNS lookup

A

Used to find the domain name associated with an IP address; the opposite of a DNS lookup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

reverse social engineering

A

A social engineering attack that manipulates the victim into calling the attacker for help.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

script kiddie

A

A derogatory term used to describe an attacker, usually new to the field, who uses simple, easy-to-follow scripts or programs developed by others to attack computer systems and networks and deface websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

secure channel

A

A means of exchanging information from one entity to another using a process that does not provide an attacker the opportunity to reorder, delete, insert, or read information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secure Multipurpose Mail Extension (S/MIME)

A

A standard for encrypting and authenticating MIME data; used primarily for Internet e-mail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Secure Sockets Layer (SSL)

A

A protocol that uses a private key to encrypt data before transmitting confidential documents over the Internet; widely used on e-commerce, banking, and other sites requiring privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Temporal Key Integrity Protocol (TKIP)

A

A security protocol used in IEEE 802.11i to replace WEP without the requirement to replace legacy hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

third party

A

A person or entity indirectly involved in a relationship between two principals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

threat

A

Any circumstance or event with the potential to adversely impact organizational operations, organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

three-way (TCP) handshake

A

A three-step process computers execute to negotiate a connection with one another. The three steps are SYN, SYN/ACK, and ACK.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

tiger team

A

A group of people, gathered together by a business entity, working to address a specific problem or goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

time bomb

A

A program designed to execute at a specific time to release malicious code onto the computer system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

time to live (TTL)

A

A limit on the amount of time or number of iterations or transmissions in computer and network technology a packet can experience before it will be discarded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

virtual local area network (VLAN)

A

Devices, connected to one or more switches, grouped logically into a single broadcast domain.

Administrators can divide the devices connected to the switches into multiple VLANs without requiring separate physical switches.

17
Q

virtual private network (VPN)

A

A technology that establishes a tunnel to create a private, dedicated, leased-line network over the Internet.

The data is encrypted so it’s readable only by the sender and receiver.

Companies commonly use VPNs to allow employees to connect securely to the company network from remote locations.

18
Q

virtualization

A

A practice whereby the physical aspects of the hardware are virtually presented to operating systems in a way that allows one or more virtual machines (with their own operating systems) to run simultaneously on the same physical box.

19
Q

virus

A

A malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.

20
Q

virus hoax

A

An e-mail message that warns users of a nonexistent virus and encourages them to pass on the message to other users.

21
Q

white-box testing

A

A pen testing method where the attacker knows all information about the internal network. It is designed to simulate an attack by a disgruntled systems administrator or similar level.

22
Q

Whois

A

A query and response protocol widely used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address, or an autonomous system.

23
Q

wide area network (WAN)

A

Two or more LANs connected by a high-speed line across a large geographical area.