Ch 13 Key Terms Flashcards
Hardware/Software that captures packets to decode and analyze their contents
vulnerability scanner
passive scanner
network mapping scanner
protocol analyzer
protocol analyzer
used by network admin’s for network monitoring
protocol analyzer
vulnerability scanner
active scanner
passive scanner
protocol analyzer
a range of products that look for different vulnerabilities in networks or systems
network mapping scanner
passive scanner
vulnerability scanner
active scanner
vulnerability scanner
sends probes to network devices and examines the responses received back to evaluate whether a specific device needs remediation
network mapping scanner
passive scanner
vulnerability scanner
active scanner
active scanner
can identify the current software OS’s and applications being used on the network and indicate which devices might have a vulnerability (an example would be an OS that has not been patched)
passive scanner
network mapping scanner
active scanner
vulnerability scanner
passive scanner
combines network device discovery tools and network scanners to find open ports or discover shared folders
vulnerability scanner
wireless scanner
network mapping scanner
active scanner
network mapping scanner
can discover malicious wireless network activity such as failed login attempts, record these to an event log, and alert an administrator
active scanner
passive scanner
wireless scanner
configuration compliance scanner
wireless scanner
used to evaluate and report any compliance issues related to specific inducstry guidelines
active scanner
wireless scanner
configuration compliance scanner
passive scanner
configuration compliance scanner
a comprehensive review of how an enterprise follows regulatory guidelines
configuration compliance
vulnerability scanner
passive scanner
compliance audit
compliance audit
a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic but are actually imitations of real data files
honeypot
password cracker
honeynet
banner
honeypot
purpose is to invite attacks so that the attacker’s methods can be studied and that information can be used to increase network security
wireless cracker
honeypot
honeynet
banner
honeynet
a message that a service transmits when another program connects to it
password cracker
wireless cracker
banner grabbing
banner
banner
when a program intentionally gathers information such as the type of server software, the last modified date, its version number and other similar information
honeynet
banner
honeypot
banner grabbing
banner grabbing
designed to test the security of a WLAN system by attempting to break its protections of WPA or WPA2
honeynet
password cracker
explitation framework
wireless cracker
wireless cracker
intended to break the digest of a password to determine its strength
intrusive vulnerability scan
explitation framework
wireless cracker
password cracker
password cracker
a security vulnerability scanner that can determine which devices are connected to the network and the services they are running
Netcat
Nmap
penetration testing
intrusive vulnerability scan
Nmap
a command-line alternative to Nmap with additional features scanning for vulnerabilities
intrusive scan
Ifconfig
Netcat
non-intrusive scan
Netcat
used to replicate attacks during a vulnerability assessment by providing a structure of exploits and monitoring tools
explitation framework
intrusive vulnerability scan
steganography assessment tools
security assessment tools
explitation framework
can be used to determine if the data is hidden well enough to thwart unauthorized users from finding the data
blackbox
steganography assessment tools
intrusive vulnerability scan
penetration testing
steganography assessment tools
attempts to actually penetrate the system in order to perform a simulated attack
intrusive vulnerability scan
white box
non-intrusive vulnerability scan
penetration testing
intrusive vulnerability scan
designed to exploit any weaknesses in systems that are vulnerable
blackbox
non-intrusive vulnerability scan
penetration testing
white box
penetration testing
relies upon the skill, knowledge and cunning of the tester
penetration testing
gray box
black box
active reconnaissance
penetration testing
the tester has not prior knowledge of the network infrastructure
green box
white box
black box
gray box
black box
the tester has in-depth knowledge of the network and systems being tested
black box
white box
gray box
red box
white box