Ch 13 Key Terms Flashcards

1
Q

Hardware/Software that captures packets to decode and analyze their contents

vulnerability scanner

passive scanner

network mapping scanner

protocol analyzer

A

protocol analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

used by network admin’s for network monitoring

protocol analyzer

vulnerability scanner

active scanner

passive scanner

A

protocol analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a range of products that look for different vulnerabilities in networks or systems

network mapping scanner

passive scanner

vulnerability scanner

active scanner

A

vulnerability scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

sends probes to network devices and examines the responses received back to evaluate whether a specific device needs remediation

network mapping scanner

passive scanner

vulnerability scanner

active scanner

A

active scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

can identify the current software OS’s and applications being used on the network and indicate which devices might have a vulnerability (an example would be an OS that has not been patched)

passive scanner

network mapping scanner

active scanner

vulnerability scanner

A

passive scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

combines network device discovery tools and network scanners to find open ports or discover shared folders

vulnerability scanner

wireless scanner

network mapping scanner

active scanner

A

network mapping scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

can discover malicious wireless network activity such as failed login attempts, record these to an event log, and alert an administrator

active scanner

passive scanner

wireless scanner

configuration compliance scanner

A

wireless scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

used to evaluate and report any compliance issues related to specific inducstry guidelines

active scanner

wireless scanner

configuration compliance scanner

passive scanner

A

configuration compliance scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a comprehensive review of how an enterprise follows regulatory guidelines

configuration compliance

vulnerability scanner

passive scanner

compliance audit

A

compliance audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic but are actually imitations of real data files

honeypot

password cracker

honeynet

banner

A

honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

purpose is to invite attacks so that the attacker’s methods can be studied and that information can be used to increase network security

wireless cracker

honeypot

honeynet

banner

A

honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a message that a service transmits when another program connects to it

password cracker

wireless cracker

banner grabbing

banner

A

banner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

when a program intentionally gathers information such as the type of server software, the last modified date, its version number and other similar information

honeynet

banner

honeypot

banner grabbing

A

banner grabbing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

designed to test the security of a WLAN system by attempting to break its protections of WPA or WPA2

honeynet

password cracker

explitation framework

wireless cracker

A

wireless cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

intended to break the digest of a password to determine its strength

intrusive vulnerability scan

explitation framework

wireless cracker

password cracker

A

password cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a security vulnerability scanner that can determine which devices are connected to the network and the services they are running

Netcat

Nmap

penetration testing

intrusive vulnerability scan

A

Nmap

17
Q

a command-line alternative to Nmap with additional features scanning for vulnerabilities

intrusive scan

Ifconfig

Netcat

non-intrusive scan

A

Netcat

18
Q

used to replicate attacks during a vulnerability assessment by providing a structure of exploits and monitoring tools

explitation framework

intrusive vulnerability scan

steganography assessment tools

security assessment tools

A

explitation framework

19
Q

can be used to determine if the data is hidden well enough to thwart unauthorized users from finding the data

blackbox

steganography assessment tools

intrusive vulnerability scan

penetration testing

A

steganography assessment tools

20
Q

attempts to actually penetrate the system in order to perform a simulated attack

intrusive vulnerability scan

white box

non-intrusive vulnerability scan

penetration testing

A

intrusive vulnerability scan

21
Q

designed to exploit any weaknesses in systems that are vulnerable

blackbox

non-intrusive vulnerability scan

penetration testing

white box

A

penetration testing

22
Q

relies upon the skill, knowledge and cunning of the tester

penetration testing

gray box

black box

active reconnaissance

A

penetration testing

23
Q

the tester has not prior knowledge of the network infrastructure

green box

white box

black box

gray box

A

black box

24
Q

the tester has in-depth knowledge of the network and systems being tested

black box

white box

gray box

red box

A

white box

25
Q

actively probing the system, much like an attacker would do to find information

initial exploitation

active reconnaissance

passive reconnaissance

pivot

A

active reconnaissance

26
Q

the tester uses tools that do not raise any alarms

passive reconnaissance

intial exploitation

non-intrusive vulnerability scan

active reconnaissance

A

passive reconnaissance

27
Q

once the tester has conducted a recon, he uses that information to determine if it provides entry to a secure network

intial exploitation

pivot

passive reconnaissance

data retention

A

intial exploitation

28
Q

once inside the network, the tester moves around inside it to other resources; goal is to achieve privilege escalation

passive reconnaissance

data retention

intial exploitation

pivot

A

pivot

29
Q

how long data must be kept and how it is to be secured

initial baseline configuration

remediation

pivot

data retention

A

data retention

30
Q

an approach, philosophy or strategy regarding data privacy and security

initial baseline configuration

security posture

baseline posture

continuous security monitoring

A

security posture

31
Q

the standard security checklist against which systems are evaluated for security posture

security posture

initial baseline configuration

continuous security monitoring

remediation

A

initial baseline configuration

32
Q

continual observation of systems and networks through vulnerability scanning and pen testing

continuous security monitoring

security posture

initial baseline configuration

remediation

A

continuous security monitoring

33
Q

a plan that will address vulnerabilities and how to fix them before they are exploited by attackers

security posture

remediation

initial baseline configuration

continuous security monitoring

A

remediation

34
Q

overwriting the disk space with zeros or random data

wiping

swiping

erasing

degaussing

A

wiping

35
Q

to permanently destroy the entire drive by reducing or eliminating the magnetic field

erasing

swiping

degaussing

wiping

A

degaussing