How can we help?

You can also find more resources in our Help Center.

Study sets matching "term:fingerprinting = activities that scan network locales for active systems and then identify the network services offered by the host systems."

Study sets
Classes
Users

Study sets matching "term:fingerprinting = activities that scan network locales for active systems and then identify the network services offered by the host systems."

10 terms
Module 03 Scanning Networks
network scanning
first phase of hacking
second phase of haciking
Types of scanning
a set of procedures for identifying hosts, ports, and service…
footprinting (gaining basic/general info)
scanning (gathering more detailed information
port scanning... network scanning... vulnerability scanning
network scanning
a set of procedures for identifying hosts, ports, and service…
first phase of hacking
footprinting (gaining basic/general info)
20 terms
Information Security
security risk
security precaution
malware
spyware
any threat to the data held by a company or individual, inclu…
any counter-measure to prevent a computer security threat
any software or computer based activity that poses a threat
a program that installs onto a users system without permissio…
security risk
any threat to the data held by a company or individual, inclu…
security precaution
any counter-measure to prevent a computer security threat
33 terms
ITN261 Final
footprinting
port scanning
wardialing
ToneLoc
process that passively gathers information about target from…
active process that gathers information in more detail than f…
uses a modem to dial phone numbers to locate modems
wardialing program that looks for dial tones by randomly dial…
footprinting
process that passively gathers information about target from…
port scanning
active process that gathers information in more detail than f…
18 terms
ITS 221 Chapter 7
___are usually passive devices and can…
___is a specially configured connectio…
Most NBA sensors can be deployed in___…
___are decoy systems designed to lure…
NIDPSs
SPAN
passive
Honeypots
___are usually passive devices and can…
NIDPSs
___is a specially configured connectio…
SPAN
20 terms
stk-n5 security information systems
security risk
security precaution
malware
spyware
any threat to the data held by a company or individual, inclu…
any counter-measure to prevent a computer security threat
any software or computer based activity that poses a threat
a program that installs onto a users system without permissio…
security risk
any threat to the data held by a company or individual, inclu…
security precaution
any counter-measure to prevent a computer security threat
29 terms
CEH: Scanning Networks
Port Scanning
NMAP
TCP Flags
SYN
Sending carefully crafted messages or packets to well-known p…
Port scanning tool.... Used to scan networks and systems and oth…
SYN.... ACK.... URG.... PSH.... FIN.... RST.
Initiates a connection between two hosts for communication.
Port Scanning
Sending carefully crafted messages or packets to well-known p…
NMAP
Port scanning tool.... Used to scan networks and systems and oth…
25 terms
Bus. 400 Ch. 7
A(n) ____ works like a burglar alarm i…
Intrusion ____ activities finalize the…
____ is an event that triggers an alar…
____ is the process of classifying IDP…
IDS
correction
False Attack Stimulus
Alarm Filtering
A(n) ____ works like a burglar alarm i…
IDS
Intrusion ____ activities finalize the…
correction
111 terms
info security
kerberos and SESAME
RADIUS and TACACS
intrusion
intrusion detection system
remote authentication systems
systems that authenticate credentials of users trying to acce…
adverse event when attacker attempts to gain entry to an info…
detects a violation and activates an alarm.... burglar alarm
kerberos and SESAME
remote authentication systems
RADIUS and TACACS
systems that authenticate credentials of users trying to acce…
35 terms
Principles of Information Security 4th edition Chapter 7 Terms (Dr Amr Tolba)
intrusion
intrusion detection systems
intrusion detection and prevention sys…
Alert or alarm
A/n _____________________ occurs when an attacker attempts to…
A/n _____________________ works like a burglar alarm to detec…
A/n _____________________ can detect an intrusion and prevent…
An indication that a system has just been attacked or is unde…
intrusion
A/n _____________________ occurs when an attacker attempts to…
intrusion detection systems
A/n _____________________ works like a burglar alarm to detec…
37 terms
14 Crossword
netstat
Exploits
Nmap -sA
The cyber security enhancement Act of…
used to view print network connection status
Take advantage of a system or applications vulnerability
Ack steath Scan
Modernized US cyber crime legislation and mandates life senta…
netstat
used to view print network connection status
Exploits
Take advantage of a system or applications vulnerability
18 terms
Principles of Information Security, 4th Ed.,Chapter 7 (review questions)
___are usually passive devices and can…
___is a specially configured connectio…
Most NBA sensors can be deployed in___…
___are decoy systems designed to lure…
NIDPSs
SPAN
passive
Honeypots
___are usually passive devices and can…
NIDPSs
___is a specially configured connectio…
SPAN
26 terms
bus 400 ch 7
IDS
Intrusion correction
False attack stimulus
Alarm filtering
works like a burglar alarm in that it detects a violation (so…
activities finalize the restoration of operations to a normal…
an event that triggers an alarm when no actual attack is in p…
the process of classifying IDPS alerts so that they can be mo…
IDS
works like a burglar alarm in that it detects a violation (so…
Intrusion correction
activities finalize the restoration of operations to a normal…
27 terms
stk-n5 information systems set C
security risk
security precaution
malware
spyware
any threat to the data held by a company or individual, theft…
any counter-measure to prevent a computer security threat
any software or computer based activity that poses a threat
a program that installs onto a users system without permissio…
security risk
any threat to the data held by a company or individual, theft…
security precaution
any counter-measure to prevent a computer security threat
600 terms
Final 1
You have decided to perform a double b…
What is the main difference between vu…
Which of the following is included in…
A security administrator is conducting…
Inform senior management
Vulnerability scanning is performed within the security perim…
1. Looking through discarded papers or media for sensitive in…
Active fingerprinting
You have decided to perform a double b…
Inform senior management
What is the main difference between vu…
Vulnerability scanning is performed within the security perim…
430 terms
Network+ Exam Cram N10-006
LAN; Local Area Network
WAN; Wide Area Network
MediaNet
To request data from the server and pr…
A data network that is restricted to a single geographical lo…
A network that spans more than one geographical location, oft…
This is a Cisco created architecture that can look at the dif…
What is the role of the client computer in the client/server…
LAN; Local Area Network
A data network that is restricted to a single geographical lo…
WAN; Wide Area Network
A network that spans more than one geographical location, oft…
18 terms
Principles of Information Security, 4th Ed.,Chapter 7
___are usually passive devices and can…
___is a specially configured connectio…
Most NBA sensors can be deployed in___…
___are decoy systems designed to lure…
NIDPSs
SPAN
passive
Honeypots
___are usually passive devices and can…
NIDPSs
___is a specially configured connectio…
SPAN
20 terms
10/04/2016 Network+
Network
Node
LAN
WLAN
A system in which any two or more computing devices are in co…
A term for any active electronic device connected to a network.
Local Area Network - A typical network, such as a home networ…
Wireless Local Area Network - A LAN that communicates using r…
Network
A system in which any two or more computing devices are in co…
Node
A term for any active electronic device connected to a network.
24 terms
Chapter 7
Intrusion correction activities
An IDS works like a
Alarm filtering
False attack stimulus
Complete the restoration of operations to a normal state and…
Burglar alarm in that it detects a violation and activates an…
The process of classifying IDPS alerts so they can be more ef…
An event that triggers an alarm when no actual attack is in p…
Intrusion correction activities
Complete the restoration of operations to a normal state and…
An IDS works like a
Burglar alarm in that it detects a violation and activates an…
73 terms
BCIS 4740 Final Part 1 (CH 7-9)
Works like burglar alarm
Intrusion ___ activates restore operat…
Event that triggers alarm when NO attack
Process of classifying IDPS alerts so…
IDS (Intrusion Detection System)
Correction
False Attack Stimulus
Alarm Filtering
Works like burglar alarm
IDS (Intrusion Detection System)
Intrusion ___ activates restore operat…
Correction
27 terms
copy-n5 information systems set C
security risk
security precaution
malware
spyware
any threat to the data held by a company or individual, theft…
any counter-measure to prevent a threat
any software or computer based activity that poses a threat
a program that installs onto a users system without permissio…
security risk
any threat to the data held by a company or individual, theft…
security precaution
any counter-measure to prevent a threat
ITN 261 CH6
the end or clearing of a connection.
Wardialing
flags.
Serial scan; 300 seconds between scans
A packet flagged with the FIN flag signals:
A technique that has existed for more than 25 years as a foot…
Bits that are set in the header of a packet, each describing…
The Nmap command -T Paranoid performs which of the following…
the end or clearing of a connection.
A packet flagged with the FIN flag signals:
Wardialing
A technique that has existed for more than 25 years as a foot…
27 terms
stk-n5 information systems set C
security risk
security precaution
malware
spyware
any threat to the data held by a company or individual, theft…
any counter-measure to prevent a threat
any software or computer based activity that poses a threat
a program that installs onto a users system without permissio…
security risk
any threat to the data held by a company or individual, theft…
security precaution
any counter-measure to prevent a threat
106 terms
INFOSECURITY1
intrusion
intrusion detection system
intrusion prevention system
alert
A/n _____ occurs when an attacker attempts to gain entry into…
A/n _____ works like a burglar alarm to detect an attempt to…
A/n _____ can detect an intrusion and prevent that intrusion.
An indication that a system has just been attacked or is unde…
intrusion
A/n _____ occurs when an attacker attempts to gain entry into…
intrusion detection system
A/n _____ works like a burglar alarm to detect an attempt to…
25 terms
Chapter 7 IDPs
...
How does an IDS work?
Alarm Filtering
False Attack Stimulus
Intrusion correction activities complete the restoration of o…
An IDS works like a burglar alarm in that it detects a violat…
The process of classifying IDPS alerts so they can be more ef…
An event that triggers an alarm when no actual attack is in p…
...
Intrusion correction activities complete the restoration of o…
How does an IDS work?
An IDS works like a burglar alarm in that it detects a violat…
63 terms
MIS 483 Chapter 12
Anti-Virus
Anti-Spyware
A-symetric-key encryption
Authentication
An application designed to search for viruses and repair file…
Software that helps prevent computers from becoming infected…
...
The Identity of communicating parties and data sources need t…
Anti-Virus
An application designed to search for viruses and repair file…
Anti-Spyware
Software that helps prevent computers from becoming infected…
56 terms
Ch. 7 - IDPSs and Other Security Tools
True
Host-based
Correction
NIDPSs
Your organization's operational goals, constraints, and cultu…
A __________ IDPS protects the server or host's information a…
Intrusion __________ activities finalize the restoration of o…
__________ are usually passive devices and can be deployed in…
True
Your organization's operational goals, constraints, and cultu…
Host-based
A __________ IDPS protects the server or host's information a…
35 terms
Principles of Information Security 4th edition Chapter 7 Terms
intrusion
intrusion detection systems
intrusion detection and prevention sys…
Alert or alarm
A/n _____________________ occurs when an attacker attempts to…
A/n _____________________ works like a burglar alarm to detec…
A/n _____________________ can detect an intrusion and prevent…
An indication that a system has just been attacked or is unde…
intrusion
A/n _____________________ occurs when an attacker attempts to…
intrusion detection systems
A/n _____________________ works like a burglar alarm to detec…
193 terms
computers
Active Fingerprinting
Banner
Internet Control Message Protocol (ICMP)
OS Identification
A form of OS fingerprinting that involves actively requesting…
Data that reveals telling information such as version and ser…
The part of TCP/IP that supports diagnostics and error control.
The practice of identifying the operating system of a network…
Active Fingerprinting
A form of OS fingerprinting that involves actively requesting…
Banner
Data that reveals telling information such as version and ser…
75 terms
Information Security CH 7
intrusion
intrusion detection and prevention sys…
intrusion detection system (IDS)
intrusion prevention system (IPS)
an adverse event in which an attacker attempts to gain entry…
the general term for both IPS and IDS
a system capable of automatically detecting an intrusion into…
An IDS system capable of automatically responding to a detect…
intrusion
an adverse event in which an attacker attempts to gain entry…
intrusion detection and prevention sys…
the general term for both IPS and IDS
37 terms
Mod 14 Homework
Used to view/print network connection…
Take advantage of a system or applicat…
Nmap switch option -sA performs ______…
Modernized U.S. cyber crime legislatio…
Netstat
Exploits
Ack Stealth
Cyber Security Enhancement Act of 2002
Used to view/print network connection…
Netstat
Take advantage of a system or applicat…
Exploits
20 terms
Information Security CH7 Test
A(n) ___ works like a burglar alarm in…
___ benchmakre and monitor the status…
___ is the action of luring an individ…
___ is the process of classifying IDPS…
IDS
HIDPSs
Entrapment
Alarm filtering
A(n) ___ works like a burglar alarm in…
IDS
___ benchmakre and monitor the status…
HIDPSs
430 terms
Network+ Exam Cram N10-006(definitions)
LAN; Local Area Network
WAN; Wide Area Network
MediaNet
To request data from the server and pr…
A data network that is restricted to a single geographical lo…
A network that spans more than one geographical location, oft…
This is a Cisco created architecture that can look at the dif…
What is the role of the client computer in the client/server…
LAN; Local Area Network
A data network that is restricted to a single geographical lo…
WAN; Wide Area Network
A network that spans more than one geographical location, oft…
35 terms
Principles of Information Security 4th edition Chapter 7
intrusion
intrusion detection systems
intrusion detection and prevention sys…
Alert or alarm
A/n _____________________ occurs when an attacker attempts to…
A/n _____________________ works like a burglar alarm to detec…
A/n _____________________ can detect an intrusion and prevent…
An indication that a system has just been attacked or is unde…
intrusion
A/n _____________________ occurs when an attacker attempts to…
intrusion detection systems
A/n _____________________ works like a burglar alarm to detec…
23 terms
Chapter 6
During the scanning phase what one fac…
What creates the opportunity for an at…
What is the goal of war driving
What are some war driving defenses
Timing
Clueless users deploying access points without understanding…
To locate WLANs and determine their Extended Service Set Iden…
Set ESSID to something that won't attract attention, Configur…
During the scanning phase what one fac…
Timing
What creates the opportunity for an at…
Clueless users deploying access points without understanding…
19 terms
CH 6
Active fingerprinting
Banner
Internet Control Message Protocol (ICMP)
OS identification
A form of OS fingerprinting that involves actively requesting…
banner information is data that reveals telling information s…
the part of TCP/IP that supports diagnostics and error contro…
OS identification is the practice of identifiying the operati…
Active fingerprinting
A form of OS fingerprinting that involves actively requesting…
Banner
banner information is data that reveals telling information s…
61 terms
Chapter 11 Assessment and Audits
11.1.11 Practice exam
Which of the following functions can a…
You want to make sure that a set of se…
You want to be able to identify the se…
...
Determining which ports are open on a firewall... Discovering un…
Port Scanner
Vulnerability Scanner
11.1.11 Practice exam
...
Which of the following functions can a…
Determining which ports are open on a firewall... Discovering un…
22 terms
Lecture 3 footprinting
footprinting
scanning
scanning countermeasures
war dialing
process of profiling a company to gain their network details…
discovering what services available within discovered IP rang…
-config firewall & IDS rules to detect and block probes... -blo…
automated process hackers use to find pc via telephone lines…
footprinting
process of profiling a company to gain their network details…
scanning
discovering what services available within discovered IP rang…
13 terms
14.2.4 Practice exam
You have decided to perform a double b…
Which of the following activities are…
Which of the following types of penetr…
A security administrator is conducting…
Inform senior management
Attempting social engineering... Running a port scanner
Zero knowledge team
Active fingerprinting
You have decided to perform a double b…
Inform senior management
Which of the following activities are…
Attempting social engineering... Running a port scanner
27 terms
CEH Module 3 - Scanning Networks
Network Scanning
Ping Scan
IPv4 Address size
IPV6 Address size
Is a set of procedures for identifying hosts, ports, and serv…
A scan which involves sending ICMP ECHO requests to a host. I…
32 bits
128 bits
Network Scanning
Is a set of procedures for identifying hosts, ports, and serv…
Ping Scan
A scan which involves sending ICMP ECHO requests to a host. I…
189 terms
Comptia Network+ N10-006 LO Lesson 15 - Nyberg
Identify the problem
Establish a theory of probable cause
Test the theory to determine cause
Establish a plan of action to resolve…
The first step in the Troubleshooting Methodology
Follows - Identify the problem
Follows - Establish a theory of probable cause
Follows - Test the theory to determine cause
Identify the problem
The first step in the Troubleshooting Methodology
Establish a theory of probable cause
Follows - Identify the problem
104 terms
JCAC Mod 14 part 1
netstat
exploits
nmap -sA
Cyber Security Enhancement
What is used to view/print network connection status?
What takes advantage of a system or applications vulnerability?
What nmap switch option performs ACK Stealth scan?
What 2002 Act, modernized U.S. cyber crime legislation and ma…
netstat
What is used to view/print network connection status?
exploits
What takes advantage of a system or applications vulnerability?
104 terms
JCAC Mod 14 part 1
netstat
exploits
nmap -sA
Cyber Security Enhancement
What is used to view/print network connection status?
What takes advantage of a system or applications vulnerability?
What nmap switch option performs ACK Stealth scan?
What 2002 Act, modernized U.S. cyber crime legislation and ma…
netstat
What is used to view/print network connection status?
exploits
What takes advantage of a system or applications vulnerability?
104 terms
JCAC Mod 14 part 1
netstat
exploits
nmap -sA
Cyber Security Enhancement
What is used to view/print network connection status?
What takes advantage of a system or applications vulnerability?
What nmap switch option performs ACK Stealth scan?
What 2002 Act, modernized U.S. cyber crime legislation and ma…
netstat
What is used to view/print network connection status?
exploits
What takes advantage of a system or applications vulnerability?
31 terms
CH 13 Intrusion Detection Systems and Network Security CIS 2337 Vocab
Access Control Lists (ACLs)
Analysis Engine
Anomaly Detection Model
Antispam
A list associated with an object (such as a file) that identi…
Examines the collected network traffic and compares it to kno…
In this model, the IDS must know what "normal" behavior on th…
Products that attempt to filter out that endless stream of ju…
Access Control Lists (ACLs)
A list associated with an object (such as a file) that identi…
Analysis Engine
Examines the collected network traffic and compares it to kno…
Networks
local area network
wide area network
client/server
dedicated server
multiple personal computers connected on a network
a network that extends over a long distance, each network sit…
client programs in desktop computers send info requests throu…
server dedicated to one task, i.e. printer server, QC server,…
local area network
multiple personal computers connected on a network
wide area network
a network that extends over a long distance, each network sit…
96 terms
Network + Chapter 18
Network scanner
Network scanner
Packet sniffer
Wireshark
Tool used to analyze networks.
Packet sniffers, IDS/IPS, and port scanners are types of?
Network scanner that looks inside every packet on a network s…
Free online packet sniffer that runs on Windows, OS X, Linux…
Network scanner
Tool used to analyze networks.
Network scanner
Packet sniffers, IDS/IPS, and port scanners are types of?
60 terms
Module 14: Objectives 1 - 6
Cyber Security Enhancement Act of 2002
Title 18 USC 2510
Title 18 USC 2701
Title 18 USC 1029
Modernized U.S. cybercrime legislation and mandates life sent…
Wire and Electronic Communications Interception and Intercept…
Stored Wire and Electronic Communications and Transactional R…
Fraud and Related Activity in Connection with Access to Devic…
Cyber Security Enhancement Act of 2002
Modernized U.S. cybercrime legislation and mandates life sent…
Title 18 USC 2510
Wire and Electronic Communications Interception and Intercept…
42 terms
Chapter 1: What is Behavioral Neuroscience?
neuroscience
behavioral neuroscience
neuroscientists strive to understand t…
trepanation
the scientific study of the brain and nervous system in healt…
the study of the biological foundations of behavior, emotions…
1. molecular 2. cellular 3. synaptic 4. network 5. computatio…
archaeological evidence suggests that people tried to cure di…
neuroscience
the scientific study of the brain and nervous system in healt…
behavioral neuroscience
the study of the biological foundations of behavior, emotions…
60 terms
Module 14: Objectives 1 - 6
Cyber Security Enhancement Act of 2002
Title 18 USC 2510
Title 18 USC 2701
Title 18 USC 1029
Modernized U.S. cybercrime legislation and mandates life sent…
unauthorized interception of communications, empowers Interne…
Stored information from unauthorized access and acquisition…
Fraud and Related Activity in Connection with Access to Devic…
Cyber Security Enhancement Act of 2002
Modernized U.S. cybercrime legislation and mandates life sent…
Title 18 USC 2510
unauthorized interception of communications, empowers Interne…
31 terms
CH 13 Intrusion Detection Systems and Network Security CIS 2337 Vocab
Access Control Lists (ACLs)
Analysis Engine
Anomaly Detection Model
Antispam
A list associated with an object (such as a file) that identi…
Examines the collected network traffic and compares it to kno…
In this model, the IDS must know what "normal" behavior on th…
Products that attempt to filter out that endless stream of ju…
Access Control Lists (ACLs)
A list associated with an object (such as a file) that identi…
Analysis Engine
Examines the collected network traffic and compares it to kno…
1 of 10