Term
What is the hiding of data in an image, video or sound file? |
|
Definition
|
|
Term
What is something that attracts a threat actor to try and attack a system? |
|
Definition
|
|
Term
What is something that attracts a threat actor to try and attack a list of systems? |
|
Definition
|
|
Term
|
Definition
|
|
Term
What is the discovery of connections between switches, routers, access points, and hosts of a network? |
|
Definition
|
|
Term
What are the following examples of?:
oMicrosoft System Center
oHP OpenView / Business Technology Optimization (BTO) |
|
Definition
Network Management Suites |
|
|
Term
What Windows Command shows your IP address, router information, etc.? |
|
Definition
|
|
Term
What Linux Command shows your IP address, router information, etc.? |
|
Definition
|
|
Term
What command lets you know if a system is running on the network? |
|
Definition
|
|
Term
What query is used to verify the mapping between a MAC Address and IP address? |
|
Definition
|
|
Term
What is the hardware address on your computer that does not change and is always unique? |
|
Definition
|
|
Term
What detects live hosts on a subnet? |
|
Definition
|
|
Term
What traces where data packets are moving from one router to another? |
|
Definition
|
|
Term
What allows you to figure out who owns a website and information about said user by running an IP address? |
|
Definition
|
|
Term
What are the following?:
Whois
nslookup
dig
Zone Transfers |
|
Definition
Methods of DNS Harvesting |
|
|
Term
What Windows command allows you to do the following?
•Report port status on local machine
•Switches to filter by protocol
•Display process name or PID that opened port |
|
Definition
|
|
Term
|
Definition
Your standard web port for HTTP traffic. |
|
|
Term
|
Definition
The SSL port for HTTPs traffic. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
What command lets you complete specific UDP scans and fingerprinting? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
What is an audit technique to detect unauthorized protocols and hosts? |
|
Definition
|
|
Term
What is a tool for capturing network frames? |
|
Definition
|
|
Term
What is an example of a high end packet capture tool? |
|
Definition
|
|
Term
What are the following?:
Air Crack
Wireshark |
|
Definition
Examples Of Packet Sniffers |
|
|
Term
What are tools to inject “arbitrary” or crafted network packets? |
|
Definition
|
|
Term
What is software to create covert backdoors? |
|
Definition
|
|
Term
What can create remote access back doors? |
|
Definition
|
|