click below
click below
Normal Size Small Size show me how
CEH -Terms K L M N O
Certified Ethical Hacker Terms & Definitions - K, L, M, N, O & P - info tech
Question | Answer |
---|---|
An authentication protocol that uses tickets, Ticket Granting Service and a Key Distribution Center. Developed at MIT (Massachusetts Institute of Technology). | Kerberos |
A cryptography method in which cryptographic keys are exchanged between users, allowing the use of a cryptographic algorithm (i.e., Diffe-Hellman) | KEP (Key Exchange Protocol) |
Software or Hardware application or device that captures and records a user's keystokes. | Keylogger |
A programming principle where the last piece of data added to the stack is the first piece of data taken off. | LIFO (Last in First Out) |
An evaluation which consists of interviews, Document reviews and demonstrations. There are no hands-on testing. | Level I Assessment |
An evaluation which consisists of interviews, document reviews, demonstrations, vulnerability scans and hands-on testing. | Level II Assessment |
An evaluation where testers attempt to penetrate the network. | Level III Assessment |
A legal limit on the amount of financial liability and remedies an organization is responsible for taking on. | Limits of Liability |
A computer network confined to a relatively small area, such as a single building or campus. | LAN (Local Area Network) |
A piece of malicious code inserted into a software system that will perform a malicious function when the specified conditions are met at some future point. | Logic Bomb |
A method of only permitting preapproved MAC addresses to access the network. All non-matching MAC addresses are blocked. | MAC Filtering |
A virus written in a (_blank_) language that is usually embedded in documents and spreadsheet files. | Macro Virus |
Software or firmware intended to perform unauthorized processes that impact the CIA of an information system. Can be a virus, worm, Trojan, logic bomb, etc. | Malicious Code (or Malware) |
An attack where the hacker positions himself between the client and the server in order to intercept data traveling between the two. | Man-in-the-middle Attack |
In this configuration, access to system resources are controlled by a security policy administrator. Users do not have the ability to override policy and grant access to files. | Mandatory Access Control |
A small space between two sets of interlocking doors. The first door must close before the second door opens. Separate authentication for each door is typically required. | Mantrap |
A hashing algorithm that results in a 128-bit output. | MD5 |
This sublayer of Layer 2 (Data Link) OSI reference model, emulates a full duplex logical communication channel in a multi-point network. | Media Access Control (MAC) |
A documented process for a procedure designed to be consistent, repeatable, and accountable. | Methodology |
A computer virus that infects and spreads in multiple ways. | Multipartite Virus |
An extensible mechanism for e-mail. Varieties exist for sending content such as audio, binary, or video using SMTP (Simple Mail Transfer Protocol) | MIME (Multipurpose Internet Mail Extensions) |
A systematic process for the assessment of security vulnerabilities. NSA IAM | National Security Agency INFOSEC Assessment Methodology |
A free, open source version of the Berkeley Software Distribution of Unix, often used in embedded systems. | NetBSD |
A software program for remotely controlling a Microsoft Windows computer system over a network. Generally considered malware. | NetBus |
A Device providing temporary, on-demand, point-to-point network access to users. | Network Access Server |
The process of modifying IP packet headers while in transit across a traffic routing device. Provides one-to-one translation of IP addresses. | NAT (Network Address Translation) |
An API that provides services related to the OSI model's Session Layer, allowing applications on separate computers to communicate over a LAN. | NetBIOS |
An adapter that provides the physical connection to send and receive data between the computer and the network media. | NIC (Network Interface Card) |
One or more locations from which control is exercised over a computer or telecommunications network. | NOC (Network Operations Center) |
Any kind of connection that allows you to see all traffic passing by. Generally used in reference to a NIDS (network-based IDS) to monitor all traffic. | Network Tap |
A device on a network. | Node |
The result of the utilization of digital certificates, whereby the identity of the sender of a message cannot be denied. | Non-Repudiation |
A command that instructs the system to do nothing. Many overflow attacks involve this command as a series of stringed operators (known as a ____ Sled) | NOP (nope sled) |
A commond-line tool available for many operating systems for querying of the Domain Name System (DNS) to obtain domain name or IP address records. | nslookup |
The default network authentication suite of protocols for Windows NT 4.0. It is considered insecure and was replaced by NTLMv2. | NT LAN Manager (NTLM) |
An anonymous connection to an administrative share (IPC$) on a Windows machine. This session can allow for enumeration of a Windows machine, among other attacks. | Null Session |
The practice in development of software products that allows access and modification by any would be developer. | Open Source |
A network architecture framework, Developed by the ISO. It describes the communications process between two systems across the Internet. | Open System Interconnection (OSI) Reference Model |
An attack that exploits the common mistake many people make when installing operating systems, which is, accepting and leaving all of the system defaults as is. | Operating System Attack |
Transmission using channels or frequencies outside those normally used for data transfer: often used for error reporting. | Out-of-band Signaling |
A communications path, such as the Internet, authorized for data transmission within a computer system or network. | Overt Channel |
A unit of information formatted according to specific protocols that allows for the precise transmission of data from one network node to another. Also called a datagram. | Packet |
Controlling access to a network by analyzing the headers of incoming and outgoing packets. Packets will be discarded or allowed to pass through based on rule sets enacted by a network administrator. | Packet Filtering |
A utility that uses an ICMP Echo message to determine if a specific IP address is accessible. If the message receives a reply, the address is reachable. | Packet Internet Groper (Ping) |
An attack where the hacker manipulates parameters within a URL string in hopes of modifying data. | Parameter Tampering |
An attack where the attacker intercepts data in transit along the network between the sending and receiving points, but does not alter the data (basically avesdropping). | Passive Attack |
This simple PPP authentication method sends clear text username and passwords to verify against a table listing the authoized users. | PAP (Password Authentication Protocol) |
A piece of software intended to update or fix a known problem. Usually provided by the OEM vendor of the program. | Patch |
The contents of a packet. A system attack requires that the attacker delivers this and it then needs to be executed by the system. | Payload |
The method of evaluating the security of a computer system or network by simulating an attack from a malicious source. | Penetration Testing |
The use of deceptive computer-based means to trick individuals into disclosing sensitive personal information -- usually via a carefully crafted email message. | Phishing |
Security measures, such as a locked door, perimeter fence, or security guards. Used to prevent or deter physical access to facilities and physical media. | Physical Security |
When an authorized person allows someone to pass through a secure door behind them without using an access card, pin or biometrics, thereby bypassing physical security measures. | Piggybacking |
The process of pinging each address within a subnet to map potential targets. Very fast but easily detectable. | Ping Sweep |
A virus that changes each time it runs. It uses a _____ engine to change the code but keeps the function intact. | Polymorphic Virus |
Provides router-to-router or host-to-network connections over asynchronous and synchronous circuits. | PPP (Point-to-Point) |
A VPN tunneling protocol with encryption. It initiates a tunnel by communicating to the peer on TCP port 1723. A GRE tunnel is initiated to the same peer. GRE packets are encapsulated into IP packets and seen as IP protocol 47. | PPTP (Point-to-Point Tunneling Protocol) |
Generic Routing Encapsulation (GRE) | GRE (Generic Routing Encapsulation) |
A technology where multiple internal IP addresses on a network are hidden behind one advertised Public IP address. A many-to-one NAT. | PAT (Port Address Translation) |
The process of using an application to remotely identify open ports on a system, then verifying if the system will allow connections through these ports. | Port Scanning |
Another term for Firewalking. Externally testing firewalls for open ports by generating a connection attempt on each port. | Port Knocking |
Directing a protocol from one port to another port. | Port Redirection |
An HTTP command to transmit text to a web server for processing. The opposite of an HTTP GET command. | POST |
An application layer protocol used to retrieve email from a remote server over a TCP/IP connection. Utilizes Port 110 and for secure encrypted TLS or SSL connection uses Port 995. | POP3 (Post Office Protocol) |
Layer 6 of the OSI reference model. This layer makes sure that information sent by the Application layer of the sending system is readable by the Application Layer of the receiving system. | Presentation Layer |
A data encryption/decryption program often used for e-mail and file storage. | PGP (Pretty Good Privacy) |
The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. It is one of two keys in the PKI system and is never shared. | Private Key |
The non-routable IP address range intended for use only within the confines of a single entity. 10.0.0.0, 172.16-31.0.0, 192.168.0.0 | Private Network Address |
The configuration of a network card that makes the card pass all traffic it receives to the CPU. Windows uses WinPcap. Linux uses libcap. | Promiscuous Mode |
A formal set of rules describing data transmission, especially across a network. It will determin the type of error checking, data compression methods and how systems will indicate completion of send and receipt. | Protocol |
A set of related communications protocols operating together as a group. Think OSI Reference model. | Protocol Stack |
A device set up to send a response on behalf of an end node to the requesting host. Generally used to hide the host from the Internet. | Proxy Server |
The shared key in an asymmetric key pair. Typically used to encrypt data or verify signatures. | Public Key |
A set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. | PKI (Public Key Infrastructure) |