GCIH 504.5 COMPLETE STUDY GUIDE AND PASS GUARANTEE
Reconnaissance
Page 5 Book 5
- how attackers case the joint and try to find information about their target.
Scanning
Page 5 Book 5
- how an attacker probes the target looking for different ways to break in.
Exploitation
Page 5 Book 5
- how an attacker can take over a system and deny service from other users of
the machine.
Keeping Access
Page 5 Book 5
- Once attackers get into a system, they want to maintain that valued access so
they can continue to access it time and time again.
Backdoor
Page 6 Book 5
- is a program that allows an attacker to access a system, bypassing security
controls
can allow an attacker to get around that so he doesn't have to provide a user
ID and password.
Trojan Horse
Page 6 Book 5
- is a program that looks innocuous but is actually
sinister.
- is a program that looks like it has some useful function but is actually sinister.
It has some hidden capability used by the attacker.
Two techniques used by attackers to maintain their access into a system.
,
,
,
Reconnaissance
Page 5 Book 5
- how attackers case the joint and try to find information about their target.
Scanning
Page 5 Book 5
- how an attacker probes the target looking for different ways to break in.
Exploitation
Page 5 Book 5
- how an attacker can take over a system and deny service from other users of
the machine.
Keeping Access
Page 5 Book 5
- Once attackers get into a system, they want to maintain that valued access so
they can continue to access it time and time again.
Backdoor
Page 6 Book 5
- is a program that allows an attacker to access a system, bypassing security
controls
can allow an attacker to get around that so he doesn't have to provide a user
ID and password.
Trojan Horse
Page 6 Book 5
- is a program that looks innocuous but is actually
sinister.
- is a program that looks like it has some useful function but is actually sinister.
It has some hidden capability used by the attacker.
Two techniques used by attackers to maintain their access into a system.
,
,
,