A utility that sends an ICMP echo request message

 A utility that sends an ICMP echo request message


ActiveX

 

·         A set of rules for how applications under the Microsoft Windows operating system should share information.

 

ActiveX control

 

·         A specific way of implementing ActiveX that runs through the web browser and functions like a miniature application.

 

add-on

 

·         Program that provides additional functionality to web browsers. Also called extension.

 

Address Resolution Protocol (ARP)

 

·         Part of the TCP/IP protocol for determining the MAC address based on the IP address.

 

arbitrary/remote code execution

 

·         An attack that allows an attacker to run programs and execute commands on a different computer.

 

ARP poisoning

 

·         An attack that corrupts the ARP cache.

 

Attachment

 

·         A file that is coupled to an email message and often carries malware.

 

buffer overflow attack

 

·         An attack that occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer.

 

client-side attack

 

·         An attack that targets vulnerabilities in client applications that interact with a compromised server or process malicious data.

 

command injection

 

·         Injecting and executing commands to execute on a server.

 

Cookie

 

·         A file on a local computer in which a web server stores user-specific information.

 

cross-site scripting (XSS)

 

·         An attack that injects scripts into a web application server to direct attacks at clients.

 

denial of service (DoS)

 

·         An attack that attempts to prevent a system from performing its normal functions by overwhelming the system with requests.

 

directory traversal

 

·         An attack that takes advantage of a vulnerability so that a user can move from the root directory to restricted directories.

 

DNS poisoning

 

·         An attack that substitutes DNS addresses so that the computer is automatically redirected to an attacker's device.

 

Domain Name System (DNS)

 

·         A hierarchical name system for translating domain names to IP addresses.

 

Extension

 

·         Another name for add-on.

 

first-party cookie

 

·         A cookie that is created from the website currently being viewed.

 

Flash cookie

 

·         Another name for locally shared object (LSO).

 

 

host table

 

·         A list of the mappings of host names to IP addresses.

 

HTTP header

 

·         Part of HTTP that is comprised of fields that contain the different characteristics of the data that is being transmitted.

 

HTTP header manipulation

 

·         Modifying HTTP headers to create an attack.

 

integer overflow attack

 

·         An attack that is the result of an attacker changing the value of a variable to something outside the range that the programmer had intended.

 

locally shared object (LSO)

 

·         A cookie that is significantly different in size and location from regular cookies, and can store more complex data. Also called Flash cookie.

 

man-in-the-middle

 

·         An attack that intercepts legitimate communication and forges a fictitious response to the sender.

 

persistent cookie

 

·         A cookie that is recorded on the hard drive of the computer and does not expire when the browser closes.

 

Ping

 

·         A utility that sends an ICMP echo request message to a host.

 

ping flood

 

·         An attack that uses the Internet Control Message Protocol (ICMP) to flood a victim with packets.

 

 

Answer Detail

Get This Answer

Invite Tutor