Computer Networking > Solutions Guide > CompTIA Security+ (SY0-601) Exam solution guide / Security+ Cert Exam Objectives SYO-601 (All)

CompTIA Security+ (SY0-601) Exam solution guide / Security+ Cert Exam Objectives SYO-601

Document Content and Description Below

CompTIA Security+ (SY0-601) Security+ Cert Exam Objectives SYO-601 Phishing - fraudulent attempt to obtain sensitive information or data, by disguising oneself as a trustworthy entity in an elect... ronic communication. Smishing - When someone tries to trick you into giving them your private information via a text or SMS message. Vishing - Using social engineering over the telephone system to gain access to private personal and financial information for the purpose of financial reward Spam - irrelevant or unsolicited messages sent to a large number of Internet users, for illegitimate advertising, and other activities such as phishing, and spreading malware SPIM - Spam delivered through instant messaging (IM) instead of through e-mail messaging Spear Phishing - the act of sending emails to specific and well-researched targets while pretending to be a trusted sender Dumpster Diving - exploration of a system's trash bin for the purpose of finding details in order for a hacker to have a successful online assault. Shoulder Surfing - When someone watches over your shoulder to nab valuable information as you key it into an electronic device. Pharming - cyberattack intended to redirect a website's traffic to another, fake site. Tailgating - Social engineering attempt by cyber threat actors in which they trick employees into helping them gain unauthorized access into the company premises. Eliciting Information - Procedures or techniques involving interacting with and communicating with others that is designed to gather knowledge or inform Whaling - Spear phishing that focuses on one specific high level executive or influencer Prepending - Prepend is a word that means to attach content as a prefix. For example, a prepend command could be used in a scripting language that a programmer would enter into a certain function or code module. It would add certain characters of text to the beginning of some variable or object. Identity Fraud - identity fraud is the use of stolen information such as making fake ID's and fake bank accounts Invoice Scams - using fraudulent invoices to steal from a company Credential Harvesting - the use of MITM attacks, DNS poisoning, phishing, etc. to amass large numbers of credentials (username / password combinations) for reuse. Reconnaissance - - Information gathering about a target network Hoax - Cyber hoax scams are attacks that exploit unsuspecting users to provide valuable information, such as login credentials or money. Impersonation - typically involves an email that seems to come from a trusted source. Watering hole attack - security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit. The goal is to infect a targeted user's computer and gain access to the network at the target's place of employment. Typo squatting - type of cybersquatting used by imposters that involve registering domains with intentionally misspelled names of popular web addresses to install malware on the user's system Pretexting - the practice of presenting oneself as someone else in order to obtain private information. Influence campaigns - Hybrid warfare - - Combining conventional warfare with cyberwarfare Social Media Campaign - Planned, coordinated marketing efforts using one or more social media platforms. Principles: - Authority: an attacker may try to appear to have a certain level authority. Intimidation: may try to make the victim think that something terrible is going to happen if they don't comply with the attacker's wishes. Consensus: An attacker may try to sway the mind of a victim using names they are familiar with, saying that such ones provided them information (they are fishing for) in the past and you should be able to do the same. Scarcity: An attacker may try to set a time limit on a victim so that they can comply with their wishes by a certain deadline. Familiarity: they make you familiar with them on the phone and make you want to do things for them. Trust: The attacker in this case can claim to be a friend or close associate of someone you may know very well and that's trusted. Urgency: When attackers want you to act and not think, they want you to do what they want as quickly as possible so that there's no time to spot all the red flags. Malware - a program or file designed to be disruptive, invasive and harmful to your computer. Ransomware - Software that encrypts programs and data until a ransom is paid to remove it. Worms - Independent computer programs that copy themselves from one computer to other computers over a network potentially unwanted program (PUP) - program that installs itself on a computer, typically without the user's informed consent Fileless virus - Software that uses legitimate programs to infect a computer. It does not rely on files and leaves no footprint, making it challenging to detect and remove. command and control - A computer controlled by an attacker or cybercriminal which is used to send commands to systems compromised by malware and receive stolen data from a target network Bots - self-propagating malware that infects its host and connects back to a central server(s). Cryptomalware - Malware to remain in place for as long as possible, quietly mining in the background. logic bomb - A computer program or part of a program that lies dormant until it is triggered by a specific logical event. Spyware - Type of malware that infects your PC or mobile device and gathers information about you, including the sites you visit, the things you download, your usernames and passwords, payment information, and the emails you send and receive. Keyloggers - software that tracks or logs the keys struck on your keyboard, typically in a covert manner so that you don't know that your actions are being monitored. Remote Access Trojan - type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim's machine. Rootkit - software program, typically malicious, that provides privileged, root-level (i.e., administrative) access to a computer while concealing its presence on that machine Backdoor - refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application. Password Attack - Any type of attack in which the attacker attempts to obtain and make use of passwords illegitimately. Spraying password attack - Dictionary password attack - An attack method that takes all the words from a dictionary file and attempts to log on by entering each dictionary entry as a password. brute force password attack (offline and online) - an attempt to guess a password by attempting every possible combination of characters and numbers in it Rainbow Tables - an attack on a password that uses a large pregenerated data set of hashes from nearly every possible password Plaintext/unencrypted password attack - Malicious universal serial bus (USB) cable - Malicious flash drive - Card cloning - Skimming - Adversarial artificial intelligence (AI) - 1. Tainted training for machine learning (ML) 2. Security of machine learning algorithms Supply-chain attacks - Cloud-based vs. on-premises attacks - Cryptographic attacks - 1. Birthday: 2. Collision: 3. Downgrade: Privilege escalation - Cross-site scripting - Injections - Structured query language (SQL) - Dynamic link library - Lightweight directory access protocol (LDAP) - Extensible markup language (XML) - Pointer/object dereference - Directory traversal - Buffer overflows - Race conditions(Time of check/time of use) - Error handling - Improper input handling - Replay attack (session replays) - Integer overflow - Request forgeries - 1. Server-side 2. Cross-site Application programming interface (API) attacks - Resource exhaustion - Memory leak - Secure sockets layer (SSL) stripping - Driver manipulation - Shimming - Refactoring - Pass the hash - Wireless Evil Twin - Rogue access point - Bluesnarfing - Bluejacking - Some users with Bluetooth-enabled mobiles use this technology to send anonymous text messages to strangers. Disassociation - Jamming - Radio frequency identifier (RFID) - Near Field Communication (NFC) - A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity. Initialization Vector (IV) - A 24-bit value used in WEP that changes each time a packet is encrypted. On-path attack(Man-in-the-middle) - Layer 2 attacks - Address resolution protocol poisoning - Media access control flooding - MAC Cloning - Domain Name System (DNS) - A hierarchical system for naming resources on the Internet. Domain jacking - DNS poisoning - Technique used by criminals to alter DNS records and drive users to fake sites, to committing phishing. Universal resource locator redirection - Domain reputation - Distributed Denial of Service (DDoS) - An attack that uses many computers to perform a DoS attack. DDOS network - DDOS application - DDOS operational technology - Malicious code or script execution - . . . . . . . . . . Continued [Show More]

Last updated: 1 year ago

Preview 1 out of 38 pages

Reviews( 0 )

Recommended For You

 Managerial Economics> Solutions Guide > Managerial Economics in a Global Economy 8th Edition By Dominick Salvatore (Solutions Manual ) (All)

preview
Managerial Economics in a Global Economy 8th Edition By Dominick Salvatore (Solutions Manual )

Reflecting the highly globalized nature of tastes, production, labor markets, and financial markets in today's world, Managerial Economics in a Global Economy, Eighth Edition, presents the theory of t...

By eBookSmTb , Uploaded: Jun 01, 2022

$20

 Business Administration> Solutions Guide > Australasian Business Statistics 4th Edition By Black, Asafu ,Adjaye, Burke, Khan, King, Perera, Papadimos, Sherwood, Wasimi (Solution Manual All Chapters) (All)

preview
Australasian Business Statistics 4th Edition By Black, Asafu ,Adjaye, Burke, Khan, King, Perera, Papadimos, Sherwood, Wasimi (Solution Manual All Chapters)

Data-driven decisions are driving the global knowledge economy. To get the edge, graduates need the power of statistical analysis to create business insight. This fourth edition of Australasian Busine...

By eBookSmTb , Uploaded: Nov 23, 2021

$20

 Business Law> Solutions Guide > International Economics Theory and Policy 12th edition By Paul R. Krugman, Maurice Obstfeld, Marc Melitz (Solutions Manual ) (All)

preview
International Economics Theory and Policy 12th edition By Paul R. Krugman, Maurice Obstfeld, Marc Melitz (Solutions Manual )

1. Introduction PART 1: INTERNATIONAL TRADE THEORY 2. Word Trade: An Overview 3. Labor Productivity and Comparative Advantage: The Ricardian Model 4. Specific Factors and Income Distribution 5....

By eBookSmTb , Uploaded: Nov 05, 2022

$25

 Education> Solutions Guide > Essentials of Accounting for Governmental and Not-for-Profit Organizations, 14th Edition By Paul Copley (Solutions Manual ) (All)

preview
Essentials of Accounting for Governmental and Not-for-Profit Organizations, 14th Edition By Paul Copley (Solutions Manual )

The focus of Copley's Essentials of Accounting for Governmental and Not-for-Profit Organizations, 14th edition is on the preparation of external financial statements which is a challenge for governmen...

By eBookSmTb , Uploaded: Oct 07, 2022

$20

 Urban Policy and Planning> Solutions Guide > Dental list Yellow pages (All)

preview
Dental list Yellow pages

HumanaDental PPO dental directory Location: 15 miles from 07304 May 16, 2018 Dentist Locations: 4638 Get the most out of your dental plan. the covered person must send us a letter requesting a...

By Academia1434 , Uploaded: Mar 30, 2021

$1

 Statistics> Solutions Guide > MAT 240 Module Five Assignment Hypothesis Testing for Regional Real Estate Company (All)

preview
MAT 240 Module Five Assignment Hypothesis Testing for Regional Real Estate Company

Scenario You have been hired by the Regional Real Estate Company to help them analyze real estate data. One of the company’s Pacific region salespeople just returned to the office with a newly desi...

By ACADEMICTUTORIAL , Uploaded: May 26, 2022

$4

 Finance> Solutions Guide > Week 4 Mini Case Complete The Chapter 9 (All)

preview
Week 4 Mini Case Complete The Chapter 9

During the last few years, Jana Industries has been too constrained by the high cost of capital to make many capital investments. Recently, though, capital costs have been declining, and the company h...

By ACADEMICTUTORIAL , Uploaded: May 26, 2022

$3.5

 Accounting> Solutions Guide > ACCT370 Excel Project Part 3 (All)

preview
ACCT370 Excel Project Part 3

EXCEL PROJECT: PROJECTING FINANCIAL STATEMENTS ASSIGNMENT INSTRUCTIONS OVERVIEW Common Sized Balance Sheets (Tabs 12), Common Sized Income Statements (Tab 13), Horizontal Analysis Balanc...

By ACADEMICTUTORIAL , Uploaded: Feb 14, 2023

$6.5

 Business> Solutions Guide > Read the Chapter 19 Mini Case in Financial Management: Theory and Practice (All)

preview
Read the Chapter 19 Mini Case in Financial Management: Theory and Practice

Chapter 18 leasing and financing Chapter 19 Mini Case in Financial Management Lewis Securities Inc Read the Chapter 19 Mini Case in Financial Management: Theory and Practice. Using complete sen...

By ACADEMICTUTORIAL , Uploaded: May 01, 2023

$5.5

 Calculus> Solutions Guide > Applied Calculus, 6th Edition By Hughes-Hallett, Lock, Gleason (Solutions Manual) (All)

preview
Applied Calculus, 6th Edition By Hughes-Hallett, Lock, Gleason (Solutions Manual)

A text for interactive Calculus courses, featuring innovative problems This sixth edition of Applied Calculus engages students with well-constructed problems and content to deepen understanding. The R...

By eBookSmTb , Uploaded: Dec 09, 2022

$25

$7.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
134
0

Document information


Connected school, study & course



About the document


Uploaded On

Jul 24, 2022

Number of pages

38

Written in

Seller


seller-icon
CoursesExams

Member since 3 years

316 Documents Sold


Additional information

This document has been written for:

Uploaded

Jul 24, 2022

Downloads

 0

Views

 134

Document Keyword Tags

THE BEST STUDY GUIDES

Avoid resits and achieve higher grades with the best study guides, textbook notes, and class notes written by your fellow students

custom preview

Avoid examination resits

Your fellow students know the appropriate material to use to deliver high quality content. With this great service and assistance from fellow students, you can become well prepared and avoid having to resits exams.

custom preview

Get the best grades

Your fellow student knows the best materials to research on and use. This guarantee you the best grades in your examination. Your fellow students use high quality materials, textbooks and notes to ensure high quality

custom preview

Earn from your notes

Get paid by selling your notes and study materials to other students. Earn alot of cash and help other students in study by providing them with appropriate and high quality study materials.

WHAT STUDENTS SAY ABOUT US


What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·