P Glossary Flashcards

1
Q

Packer

A

A method of compressing software to avoid detection from anti-malware systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Packet Crafting

A
  • Generating a packet that has fields set in a way specified by the attacker
  • May include a payload in addition to headers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Persistence

A

A method an attacker would use to maintain access to a system after the initial compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PGP

A

A means of managing certificates in a distributed way

Pretty Good Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phishing

A

A social engineering attack in which email is sent to a user to persuade them to give up info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ping Sweep

A

Using ICMP echo requests to identify all responding hosts on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pivoting

A

A post-exploitation activity used to gain access to other networks inside an organization by using a compromised system as a router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Port Scan

A

A technique used to identify open ports on a remote system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pretexting

A

The story used by an attacker when they make social engineering attacks.

It is a plausible reason for the attacker to contact the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Privilege Escalation

A

Trying to obtain more capabilities on a system than you currently have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Process Injection

A

Injecting code into an existing process to take control of its execution path, hiding the running code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Programmable Logic Controller

A
  • A special-purpose computing device used to interface with automation systems in manufacturing.
  • They can have data that can be read, or they can be sent instructions to pass on to the automation system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Public Key Cryptography

A

The use of asymmetric keys to encrypt and decrypt messages between parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly