Comptia Sec+ 701 Domain 2: Threats, Vulnerabilities, and Mitigations

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/38

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

39 Terms

1
New cards

Name common threat actors.

Nation-state, Hacktivist, Insider, Organized crime, Unskilled attackers

2
New cards

What is Shadow IT?

Unauthorized systems or services used without IT approval

3
New cards

What is phishing?

Fraudulent email attempt to trick users into revealing data

4
New cards

What is spear phishing?

Targeted phishing at a specific individual or organization

5
New cards

What is whaling?

Phishing attack targeting executives or high-value individuals

6
New cards

What is smishing?

Phishing using SMS/text messages

7
New cards

What is vishing?

Phishing using voice calls

8
New cards

What is pharming?

Redirecting users to a fake website without their knowledge

9
New cards

What is pretexting?

Social engineering where attacker pretends to need info under false pretenses

10
New cards

What is tailgating?

Gaining physical access by following someone into a secure area

11
New cards

What is shoulder surfing?

Observing someone’s screen/keyboard to steal data

12
New cards

What is dumpster diving?

Retrieving confidential information from discarded materials

13
New cards

What is a watering hole attack?

Compromising websites that a specific group frequently visits

14
New cards

What is a supply chain attack?

Compromising software, hardware, or vendors in the supply chain

15
New cards

What is ransomware?

Malware that encrypts data and demands payment for decryption

16
New cards

What is a logic bomb?

Malicious code triggered by a specific event or time

17
New cards

What is a worm?

Self-replicating malware spreading without human action

18
New cards

What is a trojan?

Malware disguised as legitimate software

19
New cards

What is spyware?

Malware that secretly gathers user activity and data

20
New cards

What is adware?

Software that delivers unwanted ads and may collect data

21
New cards

What is a rootkit?

Malware that hides system modifications and maintains privileged access

22
New cards

What is a botnet?

A network of compromised devices controlled remotely by an attacker

23
New cards

What is a DDoS attack?

Distributed Denial of Service — multiple systems overwhelming a target

24
New cards

What is an amplification attack?

Using a protocol/service to increase attack traffic volume (e.g., DNS amplification)

25
New cards

What is SQL injection?

Code injection into SQL queries to manipulate a database

26
New cards

What is XSS?

Cross-Site Scripting — injecting malicious scripts into web applications

27
New cards

What is CSRF?

Cross-Site Request Forgery — tricking a user into executing unwanted actions

28
New cards

What is buffer overflow?

Writing more data into memory than allocated, leading to code execution

29
New cards

What is privilege escalation?

Gaining higher-level access than intended

30
New cards

What is session hijacking?

Taking over an active user session

31
New cards

What is man-in-the-middle?

Intercepting and altering communication between two parties

32
New cards

What is DNS poisoning?

Corrupting DNS records to redirect traffic to malicious sites

33
New cards

What is ARP poisoning?

Sending fake ARP messages to redirect traffic within a LAN

34
New cards

What is a vulnerability scan?

Automated process to identify security weaknesses

35
New cards

What is a penetration test?

Simulated attack to exploit vulnerabilities and test defenses

36
New cards

What is patch management?

Regularly applying updates to fix vulnerabilities

37
New cards

What is hardening?

Reducing attack surface by disabling unnecessary services and accounts

38
New cards

What is segmentation?

Splitting networks to limit attacker movement

39
New cards

What is isolation?

Separating critical assets from general access