Key Terms

Table of contents:

  • Authentication
  • Authorization
  • Biometrics
  • Bollards
  • Closed Circuit TV (CCTV)
  • Combination locks
  • Commercial information classification system
  • Commission on Critical Infrastructure Protection (PCCIP)
  • Crossover error rate (CER)
  • Defense in depth
  • Discernment
  • Discretionary access control
  • Destruction
  • Device locks
  • Dumpster diving
  • False acceptance rate (FAR)
  • False rejection rate (FRR)
  • Fire detection
  • Fire prevention
  • Fire suppression
  • Governmental information classification system
  • Identification
  • Man-made threats
  • Mandatory access control
  • Mantraps
  • Mean Time Between Failure
  • Mean Time to Repair
  • Natural threats
  • Non-discretionary access control
  • Paper shredders
  • Piggybacking
  • Shoulder surfing
  • Social engineering
  • Theft
  • Tumbler locks
  • Turnstiles
  • Vandalism
  • Warded locks

Apply Your Knowledge

Part I: Exam Preparation

The Business Aspects of Penetration Testing

The Technical Foundations of Hacking

Footprinting and Scanning

Enumeration and System Hacking

Linux and Automated Security Assessment Tools

Trojans and Backdoors

Sniffers, Session Hijacking, and Denial of Service

Web Server Hacking, Web Applications, and Database Attacks

Wireless Technologies, Security, and Attacks

IDS, Firewalls, and Honeypots

Buffer Overflows, Viruses, and Worms

Cryptographic Attacks and Defenses

Physical Security and Social Engineering

Part II: Final Review

Part III: Appendixes

Appendix A. Using the ExamGear Special Edition Software

Certified Ethical Hacker Exam Prep
Certified Ethical Hacker Exam Prep
ISBN: 0789735318
EAN: 2147483647
Year: 2007
Pages: 247
Authors: Michael Gregg © 2008-2020.
If you may any questions please contact us: