IS4560 T&D CHAPTER 7 Flashcards
____ is - A device left behind on a system by an attacker with the purpose of allowing the attacker to reenter the system later. Also defined as an entry point on a system that an attacker uses to gain entry to a system. Backdoors typically provide a means of gaining entry into a system without having to go through normal security checks and systems.
Backdoor
____ is - The process of probing services, systems, and applications with the goal of discov- ering detailed information that can be used to attack a target system. Enumeration has the ability to reveal user accounts, passwords, group names, and other information about a target.
Enumeration
____ is - Software designed to capture the keystrokes of the user and then be retrieved by an attacker later on.
Keylogger
____ is - A feature present in Windows operating systems used to connect to a system remotely. The feature has the ability to reveal usernames and share information on a target system.
NULL session
____ is - The activity of obtaining a password by using methods designed to determine the password or capture the password.
Password cracking
____ is - The process of increasing privileges above what one would otherwise possess with a user account. The process is performed by cracking the password of an existing account or by changing the password of an account that already has access.
Privilege escalation
____ is - A type of attack targeted toward passwords in which every combination of charac- ters is hashed and then compared a hashed password later.
Rainbow table
____ is - A piece of software placed on a system to do any number of tasks on behalf of an attacker. Rootkits have the ability to hand control of a system over to an attacker at a very fundamental level.
Rootkit
____ is - The part of the Windows operating system that holds user account and associated passwords in a hashed format.
Security Account Manager (SAM)
____ is - A protocol used to manage network devices.
Simple Network Management Protocol (SNMP)
____ is - Software designed to track or observe the usage of a computer system. Refers to a class of software that is designed to hide and observe the actions of a victim. Software of this type can intercept information for purposes of identity theft, financial gain or other information.
Spyware
____ is - A language used to interact with databases. Using SQL it is possible to access, manipulate and change data in databases to differing degrees.
Structured Query Language (SQL)
____ is - A piece of software that infects a system and can perform any action such as corrupting data or system files to formatting drives.
Virus