CEH Chapter 3 Crossword

123456789101112131415161718192021222324252627282930313233
Across
  1. 2. Sending packets with invalid checksum values
  2. 3. TCP flag that acknowledges received data
  3. 7. Packet analysis tool used for traffic inspection
  4. 10. Network scanning tool used to discover hosts and services
  5. 12. Service masking user identity during web access
  6. 14. Process of identifying operating system characteristics
  7. 16. Intermediary server masking original client address
  8. 18. Splitting packets to evade firewall detection
  9. 22. Scan sending FIN URG and PSH flags
  10. 23. Packet lifetime value used for OS identification
  11. 25. TCP flag used to initiate a connection
  12. 26. Protocol used for network diagnostics and error reporting
  13. 27. Forging address information to bypass security controls
  14. 28. Technique used to identify operating system
  15. 30. Filtering inbound packets with invalid source addresses
  16. 32. TCP scan using FIN and ACK flags
  17. 33. Connectionless protocol used for port scanning
Down
  1. 1. TCP field determining data transmission capacity
  2. 4. Linking multiple proxies to increase anonymity
  3. 5. TCP flag used to reset or terminate a connection
  4. 6. Shuffling host scan order to evade detection
  5. 8. ICMP message used to request subnet mask information
  6. 9. Host discovery technique using TCP SYN packets
  7. 11. Process of identifying remote operating system
  8. 13. Protocol that resolves IP addresses to MAC addresses
  9. 15. Host discovery technique using TCP ACK packets
  10. 17. Scan that sets FIN, URG, and PSH flags
  11. 19. Filtering outbound packets to prevent spoofed traffic
  12. 20. ICMP message used to request time information from a host
  13. 21. Scan that sends packets with no TCP flags set
  14. 24. Network scanner used for OS identification
  15. 25. Transport protocol supporting multihoming and multistreaming
  16. 29. TCP flag used to gracefully close a connection
  17. 31. Protecting transmitted data using cryptographic methods