Deck C Prt. 2 Flashcards
Macro Virus
Is Usually Targeted at Microsoft Office Products
Nessus OR Qualys
Aare the Best Scan TOOLS to Discover Vulnerabilities on a Windows Based Computer
Nikto
Is a Tool that can be Used to Perform Comprehensive Tests against Web Servers, Including Dangerous files on CGIs. NIKTO is a Pluggable Web Server and CGI Scanner written in PERL.
Nmap Option
nmap -F is the Option that allows you to Scan Fewer Ports than the Default Scan using nmap tool
Nslookup
Norecursive update.antivirus.com Is the Command that you can use to determine if the entry is present in DNS Cache.
PKI (Public Key Infrastructure)
Is Designed to verify and Authenticate the Identity of INDIVIDUALS within the enterprise taking part in a DATA Exchange.
Password Spraying
Is a Technique of cracking User Accounts in which the Hacker uses a list of common Passwords from the internet compiled into a list and then feeds that list as an Argument into the Password Cracking Application. Password Spraying uses a few common passwords to Target Thousands of accounts whereas Brute Force Attack Targets few Accounts with Thousands of Different Passwords Combinations
Port 123
NTP (Network Time Protocol) UDP Port 123
Presentation Layer
Is the Layer of the OSI 7 Layers that is Responsible for Encryption and Decryption of the Message.
Private IP Address
192.168.1.0 is a Private IP Address and will now allow the computer to Reach the Internet since the Gateway is Not Routing to a Public IP Address. Any IP Address Starting with 192.168 is a Private IP Address
Privilege Escalation
Is used When the White Hat Hacker Gains control over a User Account and Attempts to acquire Access to Another Account Confidential Files and information.
RIPE NCC
Is the RIR( Regional Internet Registry) for France, Europe, West Asia, and former USSR. A RIR Oversees the Allocations and Registration of Internet Number Resources (IPv4 Addresses, IPv6 Addresses and autonomous Systems numbers) in a Specific Region.
Ransomware
Best Control AGAINST Ransomware is to use OFFLINE Backup.
Reconnaissance
Is the TIME that Hacker Spends performing RESEARCH to locate Information about a Company such as Logos, Formatting, Name of the Company, Name of the CEO, Leadership Team Etc. This is the First step in the Ethical Hacking Process.
Residual Risk
Is the Risk that remains after the Vulnerabilities are Classified and the Countermeasures have been Deployed
Secure Architecture
Best Practice is to place a Front End Web Server in a DMZ (Demilitarized Zone) That Only Handles External Web Traffic to Prevent Hackers from Compromising the Servers.
Smart Card
Is Something you have whereas PIN is Something you KNOW. Together it makes a GOOD MFA(Multi Factor Authentication)
Synchronization By Time
When The Network Devices are not Synchronized by time, The Sequence of Numerous Logged Events will not match up when Correlating Logs From Various Sources.
Tree Based Assessment
Is The Approach in Which Auditor Follows Different Strategies for each Component of an Environment
Unicode Characters
Using UNICODE CHARACTERS Is a Very common IDS Evasion Technique in the Internet
Vulnerability Scanner
Checking If the Remote HOST is Alive is the First Step Followed by Vulnerability Scanners For Scanning a Network.
Web Server Hardening
LIMITS the ADMIN or Root Level Access to the minimum number of user to secure the USER Accounts on the Web Server.
Whitelist Validation
Is a Defensive Technique that Attempts to Check that a Given DATA Matches a set of Known Rules. EXAMPLE a Whitelist Validation Rule for a US State Would be a 2-Letter Code that is only one of the valid US States. It ENSURES that only a List of ENTITIES such as the Data Type, Range, Size, and Value, Which have been approved for Secured Access is Accepted.
Wireless Network Assessment
Helps Identify Unusual Wireless Traffic in the Internal Network Generated by a Rouge Access Point that is aimed to cracking the Authentication Mechanism.