Term
|
Definition
| When a system is compromised based on a vulnerability. |
|
|
Term
|
Definition
Tareget of Evaluation
A system, program, or network that is the subject of a attack. |
|
|
Term
|
Definition
| A situation that COULD lead to a potential breach of security. |
|
|
Term
|
Definition
| Taking advantage of a vulnerability. |
|
|
Term
|
Definition
| The existence of a flaw that can lead to a undersirable event. |
|
|
Term
|
Definition
| Compromising a system via an exploit. |
|
|
Term
| List the PHASES of an ETHICAL HACK. |
|
Definition
Phase 1: Reconnaissance
Phase 2: Scanning
Phase 3: Gaining Access
Phase 4: Maintaining Access
Phase 5: Covering Tracks |
|
|
Term
| List the different types of RECONNAISSANCE. |
|
Definition
|
|
Term
| What is ACTIVE RECONNAISSANCE? |
|
Definition
Gathering information about a target that risks detection.
Overt information gathering. |
|
|
Term
| What is PASSIVE RECONNAISSANCE? |
|
Definition
Gathering information about a target without the target's knowledge.
Covert information gathering. |
|
|