Ch 13 Key Terms Flashcards
Hardware/Software that captures packets to decode and analyze their contents
vulnerability scanner
passive scanner
network mapping scanner
protocol analyzer
protocol analyzer
used by network admin’s for network monitoring
protocol analyzer
vulnerability scanner
active scanner
passive scanner
protocol analyzer
a range of products that look for different vulnerabilities in networks or systems
network mapping scanner
passive scanner
vulnerability scanner
active scanner
vulnerability scanner
sends probes to network devices and examines the responses received back to evaluate whether a specific device needs remediation
network mapping scanner
passive scanner
vulnerability scanner
active scanner
active scanner
can identify the current software OS’s and applications being used on the network and indicate which devices might have a vulnerability (an example would be an OS that has not been patched)
passive scanner
network mapping scanner
active scanner
vulnerability scanner
passive scanner
combines network device discovery tools and network scanners to find open ports or discover shared folders
vulnerability scanner
wireless scanner
network mapping scanner
active scanner
network mapping scanner
can discover malicious wireless network activity such as failed login attempts, record these to an event log, and alert an administrator
active scanner
passive scanner
wireless scanner
configuration compliance scanner
wireless scanner
used to evaluate and report any compliance issues related to specific inducstry guidelines
active scanner
wireless scanner
configuration compliance scanner
passive scanner
configuration compliance scanner
a comprehensive review of how an enterprise follows regulatory guidelines
configuration compliance
vulnerability scanner
passive scanner
compliance audit
compliance audit
a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic but are actually imitations of real data files
honeypot
password cracker
honeynet
banner
honeypot
purpose is to invite attacks so that the attacker’s methods can be studied and that information can be used to increase network security
wireless cracker
honeypot
honeynet
banner
honeynet
a message that a service transmits when another program connects to it
password cracker
wireless cracker
banner grabbing
banner
banner
when a program intentionally gathers information such as the type of server software, the last modified date, its version number and other similar information
honeynet
banner
honeypot
banner grabbing
banner grabbing
designed to test the security of a WLAN system by attempting to break its protections of WPA or WPA2
honeynet
password cracker
explitation framework
wireless cracker
wireless cracker
intended to break the digest of a password to determine its strength
intrusive vulnerability scan
explitation framework
wireless cracker
password cracker
password cracker