Term
|
Definition
Service
This record defines the hostname and port number Of servers providng specific services, such as a Directory Services server. |
|
|
Term
|
Definition
Start of Authority
This record identifies the primary name server for the zone. The SOA record contains the hostname Of the server responsible for all DNS records within the namespace, as well as the basic properties of the domain. |
|
|
Term
|
Definition
Pointer
This maps an IP address to a hostname (providng for reverse DNS lookups). You don't absolutely need a record for every entry in your DNS namespace, but these are usually associated with e-mail server records. |
|
|
Term
|
Definition
Name Server
This record defines the name servers within your namespace. These servers are the ones that respond to your clients' requests for name resolution. |
|
|
Term
|
Definition
Mail Exchange
This record identifies your e-mail servers within your domain. |
|
|
Term
|
Definition
Canonical Name
This record provides for domain name aliases within your zone. For example, you may have an FTP service and a web service running on the same IP address. CNAME records could be used to list both within DNS for you. |
|
|
Term
|
Definition
Address
This record maps an IP address to a hostname and is used most often for DNS lookups. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Echo Reply - Answer to a Type 8 Echo Request |
|
|
Term
|
Definition
ECHO Request
A ping message requesting a reply |
|
|
Term
|
Definition
Destination Unreachable
0 - Destination network unreachable
1 - Destination host unreachable
6 - Network unknown
7 - Host unknown
9 - Network administratively prohibited
10 - Host administratively prohibited
13 - Communication administratively prohibited |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Parallel normal speed scan |
|
|
Term
|
Definition
|
|
Term
Wireless stantard specifications
802.11a |
|
Definition
|
|
Term
Wireless stantard specifications
802.11b |
|
Definition
|
|
Term
Wireless stantard specifications
802.11g |
|
Definition
54Mbps
2.4 Ghz
OFDM and DSS |
|
|
Term
Wireless stantard specifications
802.11n |
|
Definition
100+ Mbps
2.4 - 5 Ghz
OFDM |
|
|
Term
Trojan Port Numbers
TCPWrappers |
|
Definition
|
|
Term
|
Definition
|
|
Term
Trojan Port Numbers
Snipernet |
|
Definition
|
|
Term
|
Definition
|
|
Term
Trojan Port Numbers
WinHole |
|
Definition
|
|
Term
|
Definition
|
|
Term
Trojan Port Numbers
SpySender |
|
Definition
|
|
Term
Trojan Port Numbers
DeepThroat |
|
Definition
|
|
Term
Trojan Port Numbers
NetBus |
|
Definition
|
|
Term
Trojan Port Numbers
Whack a Mole |
|
Definition
|
|
Term
Trojan Port Numbers
Back Orifice |
|
Definition
|
|
Term
|
Definition
|
|
Term
Stages of Ethical Hacking |
|
Definition
1. Recon
2. Scan
3. Gain Access
4. Maintain Access
5. Clear Tracks
Really Should Get Mofe Condoms |
|
|
Term
Five REGIONAL INTERNET REGISTRIES |
|
Definition
AFRINIC APNIC ARIN LACNIC RIPE NCC |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Operatinf System Discovery |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
hping commands
hping 192.168.1.3 -Q -p 139 -s |
|
Definition
Collect initial sequence number (Q) |
|
|
Term
|
Definition
Scan Mode -- port numbers to scan |
|
|
Term
|
Definition
Listen mode -- followed by signature |
|
|
Term
hping commands
-F -S -R -P -A -U -X |
|
Definition
Set TCP flags
FIN, SYN, RST, PUSH, ACK, URG, Xmas |
|
|
Term
|
Definition
Enable most common scripts |
|
|
Term
|
Definition
Aggressive scan
Enables OS fingerprinting, version detection, script scanning, and tracert |
|
|
Term
Size (bits) of WEP initialization Vector (IV) |
|
Definition
|
|
Term
|
Definition
|
|
Term
Whith type of firewall operates at level 5 of the OSI model? |
|
Definition
|
|
Term
On which level of the OSI model to packet filter firewalls operate? |
|
Definition
|
|
Term
On which level of the OSI model to stateful firewalls operate? |
|
Definition
|
|
Term
OSSTMM control that provides for identification and authorization based on credentials. |
|
Definition
Authentication
(Interactive Control) |
|
|
Term
OSSTMM control that provides for contractual protection against loss or damages |
|
Definition
Indemnification
(Interactive Control) |
|
|
Term
OSSTMM control that protects assets from corruption or failure |
|
Definition
Resilience
(Interactive Control) |
|
|
Term
OSSTMM control that ensures that interactions occur according to processes defined by the asset owner |
|
Definition
Subjugation
(Interactive Control) |
|
|
Term
OSSTMM control that maintains interactivity with assets if corruption or failure occurs |
|
Definition
Continuity
(Interactive Control) |
|
|
Term
OSSTMM control that prevents a participant from denying its actions |
|
Definition
Nonrepudiation
(Process Control) |
|
|
Term
OSSTMM control that ensures that only participants have knowledge of an asset |
|
Definition
Confidentiality
(Process Control) |
|
|
Term
OSSTMM control that ensures that only participants have access to the asset |
|
Definition
Privacy
(Process Control) |
|
|
Term
OSSTMM control that ensures that participants know when assets and processes change |
|
Definition
Integrity
(Process Control) |
|
|
Term
OSSTMM control that notifies participants when interactions occur |
|
Definition
|
|
Term
Protocol Hping2 uses by default (no switches) |
|
Definition
|
|
Term
In which order are Snort IDS rules evaluated by default?
|
|
Definition
|
|
Term
Maximum length of an LM password |
|
Definition
|
|
Term
RSA is particularly susceptible to what kind of attack? |
|
Definition
Chosen ciphertext attacks |
|
|
Term
Security standard that categorizes control objectives into domains (such as planning and organization or delivery and support)? |
|
Definition
|
|
Term
Which security standards define security objectives and provide a list of security controls based on industry best practices? |
|
Definition
|
|