CEH study cards Flashcards

1
Q

Address Resolution Protocol (ARP)

A

A protocol used to resolve the owner of a given
MAC address when given a specific IP address. The companion to ARP is Reverse Address
Resolution Protocol (RARP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ARP cache poisoning

A

A technique by which the ARP cache or table on a target system
is altered according to the goals of the attacker. Typically, the goal is to change the path of
traffic or queries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

backdoor

A

The process of using tools such as Telnet to retrieve information for a
service with the goal of identification and capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

buffer

A

A discrete section of memory used to temporarily hold results and instructions during
execution of an application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

buffer overflow

A

An attack in which code is injected into a buffer with the intention of
interrupting or taking over the execution of an application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Common Internet File System (CIFS)/Server Message Block (SMB)

A

A network filesharing
protocol that is implemented in Microsoft operating systems. CIFS is a more
modern implementation of the SMB protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

covert channel

A

A method of transferring data or instructions in a system in a way that is
counter to its intended design or functioning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

cross-site scripting (XSS)

A

A method of breaching security that exploits the technology of
dynamically generated web pages. In this type of attack, a script is delivered along with normal
content to be processed by a victim’s system. Because dynamic websites rely on user input, a
malicious user can input a malicious script into the page by hiding it within legitimate requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

demilitarized zone (DMZ)

A

A buffer zone between an intranet and the Internet. Typically
constructed with firewalls with the intention of hosting publicly accessible services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

egress filtering

A

A method used to prevent traffic matching certain criteria from exiting
the network. Typically implemented with routers or firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

enumeration

A

A method of exploring the services and resources of a system to ascertain
the nature of the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

firewalking

A

A method used to discover the configuration and operation of a firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

footprinting

A

The gathering of reconnaissance or information about an environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fraggle Attack

A

A UDP-based DoS attack that overwhelms a target with a large amount
of traffic. The attack utilizes an intermediate network between the attacker and the target,
which amplifies the force of the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

fragmentation

A

The breaking of packets into smaller pieces. Completely normal in the
operation of a network; however, using a packet crafter, fragmentation may be used to
evade an NIDS or firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

gray hat

A

A hacker who may work both offensively and defensively at times. Also considered
to be an individual who was a black hat at one time and later became a white hat. It is
not uncommon for these types of hackers to work for monetary or personal gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

handler

A

A system that is used to issue commands and other instructions to the members
of a botnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

hash

A

The fixed-length value that results from a hash function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

hash function

A

An algorithm used to generate a unique fixed-length value for each input.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

honeynet

A

A group of systems or networks set up with the intention of looking vulnerable
to attract attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

honeypot

A

A single system designed to entice attackers by appearing to be vulnerable.

22
Q

Hypertext Transfer Protocol (HTTP)

A

A protocol used to exchange unencrypted

information typically involving web pages or web services.

23
Q

Hypertext Transport Protocol Secure (HTTPS)

A

HTTP that uses SSL to encrypt its

communication.

24
Q

ingress filtering

A

The method of blocking or allowing traffic based on rules about what is
and isn’t accepted on a network.

25
Internet Protocol Security Architecture (IPsec)
A technology used to provide privacy, | nonrepudiation, integrity, and authentication services.
26
Kerberos
An authentication, authorization, and accounting (AAA) server that is used across platforms and technologies to validate users and systems.
27
land attack
An attack in which a packet is sent to a system with both the source and destination IPs set to the same as those of the victim.
28
logic bomb
A piece of malware that activates only when a predefined condition is met.
29
man-in-the-middle (MitM)
An attack in which a third party inserts themselves between | two parties in order to intercept and/or alter their communications.
30
Network Address Translation (NAT)
A method of directing traffic from multiple private IPs through a single or much smaller group of public IPs. From a security standpoint, NAT prevents or reduces the ability of outside parties to view information about internal systems.
31
Network Basic Input/Output System (NetBIOS)
A set of services used to enhance sharing of information and resources on small networks. NetBIOS has been largely replaced in enterprise environments by other, more secure protocols and services.
32
null session
A vulnerability in Windows that allows for an anonymous connection to the hidden administrator share on a system.
33
overt channel
A mechanism on a system designed and built into a system that represents the way a system is intended to be used
34
ping of death
An attack in which a specially constructed packet is directed toward a system with the intent of creating a DoS. The packet is designed to be fragmented by the network but reassembled by the victim into a size too large for it to handle, thus causing a crash.
35
ping sweep
A network scan in which multiple hosts are targeted with a ping to see if they are up or down. Ping sweeps are normally delivered across a broadcast domain.
36
POODLE attack
An attack that targets vulnerabilities in SSL 3.0 by downgrading TLS sessions first and then exploiting defects in SSL.
37
Post Office Protocol (POP)
A protocol used to retrieve email from an email server.
38
Pretty Good Privacy (PGP)
A peer-to-peer key exchange and encryption system | commonly used with email applications.
39
private key
An encryption key that is held by a single person or organization and used with a corresponding public key. Messages encrypted with the public key can be decrypted with the private key and vice versa.
40
public key
The companion to a private key, but unlike the private key, it is available to all parties.
41
reverse proxy
A host that allows external clients to access internal resources by rewriting URLs, thereby masking the internal resource.
42
Security Accounts Manager (SAM)
A database stored locally on a Windows system that | contains information about users and groups on that system.
43
session hijacking
The taking over of a session between two parties. Can be performed at a network level or at a web application level.
44
sheep dip
A computer specifically set up with the goal of disinfecting or removing malware.
45
Simple Mail Transfer Protocol (SMTP)
A protocol used for the transfer of email and | messages from one system to another.
46
Simple Network Management Protocol (SNMP)
A protocol used to send and receive | messages or traps to and from network devices and an SNMP agent.
47
Smurf Attack
A TCP-based DoS attack designed to overwhelm a target with traffic passed through an intermediate amplifying network.
48
teardrop attack
An attack that relies on crafting packets in a way that creates malformed packets that will cause problems in some systems.
49
User Datagram Protocol (UDP)
A connectionless protocol considered to be a best effort in design. UDP is the opposite of TCP; where TCP offers flow control and acknowledgments, UDP does not.
50
web spider
A software application designed to locate and analyze web content typically used by search engines to catalog and update content.