Deck C Prt. 2 Flashcards
Macro Virus
Is Usually Targeted at Microsoft Office Products
Nessus OR Qualys
Aare the Best Scan TOOLS to Discover Vulnerabilities on a Windows Based Computer
Nikto
Is a Tool that can be Used to Perform Comprehensive Tests against Web Servers, Including Dangerous files on CGIs. NIKTO is a Pluggable Web Server and CGI Scanner written in PERL.
Nmap Option
nmap -F is the Option that allows you to Scan Fewer Ports than the Default Scan using nmap tool
Nslookup
Norecursive update.antivirus.com Is the Command that you can use to determine if the entry is present in DNS Cache.
PKI (Public Key Infrastructure)
Is Designed to verify and Authenticate the Identity of INDIVIDUALS within the enterprise taking part in a DATA Exchange.
Password Spraying
Is a Technique of cracking User Accounts in which the Hacker uses a list of common Passwords from the internet compiled into a list and then feeds that list as an Argument into the Password Cracking Application. Password Spraying uses a few common passwords to Target Thousands of accounts whereas Brute Force Attack Targets few Accounts with Thousands of Different Passwords Combinations
Port 123
NTP (Network Time Protocol) UDP Port 123
Presentation Layer
Is the Layer of the OSI 7 Layers that is Responsible for Encryption and Decryption of the Message.
Private IP Address
192.168.1.0 is a Private IP Address and will now allow the computer to Reach the Internet since the Gateway is Not Routing to a Public IP Address. Any IP Address Starting with 192.168 is a Private IP Address
Privilege Escalation
Is used When the White Hat Hacker Gains control over a User Account and Attempts to acquire Access to Another Account Confidential Files and information.
RIPE NCC
Is the RIR( Regional Internet Registry) for France, Europe, West Asia, and former USSR. A RIR Oversees the Allocations and Registration of Internet Number Resources (IPv4 Addresses, IPv6 Addresses and autonomous Systems numbers) in a Specific Region.
Ransomware
Best Control AGAINST Ransomware is to use OFFLINE Backup.
Reconnaissance
Is the TIME that Hacker Spends performing RESEARCH to locate Information about a Company such as Logos, Formatting, Name of the Company, Name of the CEO, Leadership Team Etc. This is the First step in the Ethical Hacking Process.
Residual Risk
Is the Risk that remains after the Vulnerabilities are Classified and the Countermeasures have been Deployed