|
|
Before you take the exam, be certain you are familiar with the following terms:
| access attack | host-to-host |
| active sniffing | Hypertext Transfer Protocol (HTTP) |
| antivirus software | Hypertext Markup Language (HTML) |
| Application layer | Internet Control Management Protocol (ICMP) |
| Application Programming Interfaces (APIs) | ICMP attacks |
| armored virus | Internet Group Management Protocol (IGMP) |
| Address Resolution Protocol (ARP) | interception |
| attack | Internet Assigned Numbers Authority (IANA) |
| audit files | Internet layer |
| back door | Internet Protocol (IP) |
| brute force attack | logic bombs |
| companion virus | macro virus |
| connection-oriented | malicious code |
| Denial of service (DoS) | man in the middle attacks |
| dictionary attack | Media Access Control (MAC) |
| Distributed Denial of Service | modification attacks |
| Domain Name System (DNS) | multipartite virus |
| dumpster diving | Network Interface layer |
| eavesdropping | network sniffer |
| File Transfer Protocol (FTP) | password guessing |
| host | phage virus |
| polymorphic viruses | stealth virus |
| Post Office Protocol (POP) | TCP ACK attack |
| promiscuous mode | TCP hijacking |
| replay attacks | TCP sequence attacks |
| repudiation attacks | TCP SYN flood |
| retrovirus | Telnet |
| Routing Information Protocol (RIP) | Transmission Control Protocol (TCP) |
| security logs | Transport layer |
| sequence number | Trojan horse |
| Simple Mail Transfer Protocol (SMTP) | Trojan horse virus |
| smurf attacks | UDP attack |
| Simple Network Management Protocol (SNMP) | User Datagram Protocol (UDP) |
| snooping | virus |
| social engineering | Windows socket |
| software exploitation | worm |
| spoofing attack |
|
|