CEH Chapter 3 Crossword
Across
- 2. Sending packets with invalid checksum values
- 3. TCP flag that acknowledges received data
- 7. Packet analysis tool used for traffic inspection
- 10. Network scanning tool used to discover hosts and services
- 12. Service masking user identity during web access
- 14. Process of identifying operating system characteristics
- 16. Intermediary server masking original client address
- 18. Splitting packets to evade firewall detection
- 22. Scan sending FIN URG and PSH flags
- 23. Packet lifetime value used for OS identification
- 25. TCP flag used to initiate a connection
- 26. Protocol used for network diagnostics and error reporting
- 27. Forging address information to bypass security controls
- 28. Technique used to identify operating system
- 30. Filtering inbound packets with invalid source addresses
- 32. TCP scan using FIN and ACK flags
- 33. Connectionless protocol used for port scanning
Down
- 1. TCP field determining data transmission capacity
- 4. Linking multiple proxies to increase anonymity
- 5. TCP flag used to reset or terminate a connection
- 6. Shuffling host scan order to evade detection
- 8. ICMP message used to request subnet mask information
- 9. Host discovery technique using TCP SYN packets
- 11. Process of identifying remote operating system
- 13. Protocol that resolves IP addresses to MAC addresses
- 15. Host discovery technique using TCP ACK packets
- 17. Scan that sets FIN, URG, and PSH flags
- 19. Filtering outbound packets to prevent spoofed traffic
- 20. ICMP message used to request time information from a host
- 21. Scan that sends packets with no TCP flags set
- 24. Network scanner used for OS identification
- 25. Transport protocol supporting multihoming and multistreaming
- 29. TCP flag used to gracefully close a connection
- 31. Protecting transmitted data using cryptographic methods