CEHv10 Flashcards
What is preventative control?
Controls in place to prevent something from occurring. A smart card could be preventative meassure
What is Corrective control
An attempt to correct an issue. Like antivirus attempting to remove malware.
What is Registration Authority
The registration authority (RA) is the entity responsible for receiving certificate request, identifying the subject and requesting the CA to issue a certificate.
what is the OCSP?
Online Certificate Status Protocol. Obtains revocation status of X.509 certificates
What does the Verification Authority (VA) do?
Validates the identity of a subject when a certificate is used.
What does a CA Certificate Authority do?
Issues certificates based on requests from the RA
What does SOAP do?
Simple Object Access Protocol. Is platform independent, simplifies communication and leverages multiple transport protocols.
Not faster then CORBA because it utilizes XML which takes longer then binary.
What is CORBA?
Common Object Request Broker Architect. A standard defined by the object management group (OMG). Designed to facilitate the communication of systems that are deployed on diverse platforms
What is IPChains
A firewall on older linux kernels up to verion 2.2x
Has the ability to filter packet fragments.
What is IPTables
A linux firewall that replaced IPChains from Linux kernel version 2.4x and above
What is ipfwadm?
An older linux firewall replaced by IPChains.
What are the 3 types of the Web Application Architecture
- Client or presentation layer - The frontend of the application.
- Business logic layer - Controls how the application works.
- Database Layer - Handles and stores data required by the application.
What is een alternate data stream
Hiding data in existing files
True statements regarding whitfiled diffie and martin hellman.
- The algo named after them performs encryption
2. They invented Public Key Encryption
What is the NMAP TCP Connect scan?
Peforms a full tcp connection or completes the full tcp handshake. It is very easy to detect on the hosts being scanned.
what can a network vulnerability scanner not do?
Scan through a firewall.
What are the 8 steps of a CEH scanning methodology
- check for live systems
- check for open ports
- check beyond the IDS
- Grab banners
- Scan for vulnerabilities
- Draw network diagrams
- prepare proxies
- Pen test the network for scanning vulnerabilities.
Describe an N-Tier architecture
Each server performs a single and unique role in the group. Web-server, database server and application server.