|
|
Before you take the exam, be certain you are familiar with the following terms:
access attack | host-to-host |
active sniffing | Hypertext Transfer Protocol (HTTP) |
antivirus software | Hypertext Markup Language (HTML) |
Application layer | Internet Control Management Protocol (ICMP) |
Application Programming Interfaces (APIs) | ICMP attacks |
armored virus | Internet Group Management Protocol (IGMP) |
Address Resolution Protocol (ARP) | interception |
attack | Internet Assigned Numbers Authority (IANA) |
audit files | Internet layer |
back door | Internet Protocol (IP) |
brute force attack | logic bombs |
companion virus | macro virus |
connection-oriented | malicious code |
Denial of service (DoS) | man in the middle attacks |
dictionary attack | Media Access Control (MAC) |
Distributed Denial of Service | modification attacks |
Domain Name System (DNS) | multipartite virus |
dumpster diving | Network Interface layer |
eavesdropping | network sniffer |
File Transfer Protocol (FTP) | password guessing |
host | phage virus |
polymorphic viruses | stealth virus |
Post Office Protocol (POP) | TCP ACK attack |
promiscuous mode | TCP hijacking |
replay attacks | TCP sequence attacks |
repudiation attacks | TCP SYN flood |
retrovirus | Telnet |
Routing Information Protocol (RIP) | Transmission Control Protocol (TCP) |
security logs | Transport layer |
sequence number | Trojan horse |
Simple Mail Transfer Protocol (SMTP) | Trojan horse virus |
smurf attacks | UDP attack |
Simple Network Management Protocol (SNMP) | User Datagram Protocol (UDP) |
snooping | virus |
social engineering | Windows socket |
software exploitation | worm |
spoofing attack |
|
|