Term
|
Definition
When a system is compromised based on a vulnerability. |
|
|
Term
|
Definition
Tareget of Evaluation
A system, program, or network that is the subject of a attack. |
|
|
Term
|
Definition
A situation that COULD lead to a potential breach of security. |
|
|
Term
|
Definition
Taking advantage of a vulnerability. |
|
|
Term
|
Definition
The existence of a flaw that can lead to a undersirable event. |
|
|
Term
|
Definition
Compromising a system via an exploit. |
|
|
Term
List the PHASES of an ETHICAL HACK. |
|
Definition
Phase 1: Reconnaissance
Phase 2: Scanning
Phase 3: Gaining Access
Phase 4: Maintaining Access
Phase 5: Covering Tracks |
|
|
Term
List the different types of RECONNAISSANCE. |
|
Definition
|
|
Term
What is ACTIVE RECONNAISSANCE? |
|
Definition
Gathering information about a target that risks detection.
Overt information gathering. |
|
|
Term
What is PASSIVE RECONNAISSANCE? |
|
Definition
Gathering information about a target without the target's knowledge.
Covert information gathering. |
|
|