COMPTIA SECURITY + 701 SECTION 2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/88

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

89 Terms

1
New cards

Nation-state Attackers

(2.1 Threat Actors and Conversations) Attackers who are directly employed by the government.

2
New cards

Unskilled Attacker

(2.1 Threat Actors and Conversations) Uses existing computer scripts or code to launch attacks.

3
New cards

Hacktivist

(2.1 Threat Actors and Conversations) Launches attacks as part of an activist movement or to further cause.

4
New cards

Insider Threat

(2.1 Threat Actors and Conversations) Anyone with legitimate access to an organizations internal resources.

5
New cards

Organized Crimes

(2.1 Threat Actors and Conversations) Composed of a group of individuals working together in criminal activities.

6
New cards

Shadow IT

(2.1 Threat Actors and Conversations) Any unauthorized systems or applications within an organization, including cloud services.

7
New cards

Attacker Attributes

(2.1 Threat Actors and Conversations) Differences between attackers are whether an attacker comes from an internal or external source, the resources and funding available to the attacker and the attackers level of sophistication and capability

8
New cards

Data Exfiltration

(2.1 Threat Actors and Conversations) Moving data outside of an area where it is allowed to a place where it is not allowed.

9
New cards

Motivations of Attackers

(2.1 Threat Actors and Conversations) Includes data exfiltration, service disruption, blackmail, financial gain, philosophical/political beliefs, ethical hacking, revenge, espionage, and war.

10
New cards

Message-Based

(2.2 Common Threat Vector and Attack Surfaces) Includes phishing, spear phishing, and whaling attacks. Start with emails.

11
New cards

Image-based

(2.2 Common Threat Vector and Attack Surfaces) Threat vectors involve embedding malicious code within image files or using steganography to hide data within an image.

12
New cards

File-Based

(2.2 Common Threat Vector and Attack Surfaces) Involve malicious code hidden in seemingly innocuous files, such as documents or spreadsheets.

13
New cards

Voice Call

(2.2 Common Threat Vector and Attack surfaces) Include phone-based engineering attacks, where attackers impersonate trusted individuals or organizations to manipulate victims into revealing sensitive information or granting access to secure systems.

14
New cards

Removable Device

(2.2 Common Threat Vector and Attack surfaces) Attackers exploit devices like USB or external hard drives, by loading them with software.

15
New cards

Vulnerable Software (Software-based)

(2.2 Common Threat Vector and Attack surfaces) Exploiting vulnerabilities in software either through client-based attacks (Exploiting software installed on users’ devices) or agentless attacks (Directly targeting web application or services.)

16
New cards

Unsupported systems and applications (System-based)

(2.2 Common Threat Vector and Attack surfaces) Vulnerabilities in computer systems such as unsupported operating systems, vulnerable applications, hardware issues, open service ports, or default credentials.

17
New cards

Network-based

(2.2 Common Threat Vector and Attack surfaces) Attack vector that focuses on exploiting weaknesses in network infrastructure, whether through unsecured wired or wireless networks or vulnerable Bluetooth connections.

18
New cards

Supply Chain

(2.2 Common Threat Vector and Attack surfaces) Target the relationships btween organizations and their managed service providers (MSPs), vendors, or suppliers.

19
New cards

Social Engineering

(2.2 Common Threat Vector and Attack surfaces) The practice of using social tactics to gain information.

20
New cards

Phishing

(2.2 Common Threat Vector and Attack surfaces) The practice of sending emails to users to trick them into revealing personal information or clicking on a link.

21
New cards

Vishing

(2.2 Common Threat Vector and Attack Surfaces) Use the phone system to trick users into giving up personal and financial information. Often uses Voice over IP (VoIP) technology allowing the attacker to spoof caller ID, making it appear as though the call came from a real company.

22
New cards

Smishing

(2.2 Common Threat Vector and Attack surfaces) Form of phishing that uses text instead of email.

23
New cards

Misinformation/disinformation

(2.2 Common Threat Vector and Attack Surfaces) An attacker provides false information to their target to influence them to take some action or disclose some information.

24
New cards

Impersonation

(2.2 Common Threat Vector and Attack surfaces) Convince an authorized user to provide some information or help the attacker defeat a security control.

25
New cards

Business Email Compromise (BEC)

(2.2 Common Threat Vector and Attack Surfaces) A type of targeted attack that seeks to exploit the trust and authority of high-level executives or other key personnel within an organization.

26
New cards

Pretexting

(2.2 Common Threat Vector and Attack surfaces) An attacker makes up a convincing story or scenario to manipulate a target into providing sensitive information or granting access to restricted systems or areas.

27
New cards

Watering Hole

(2.2 Common Threat Vector and Attack Surfaces) Attempts to discover which websites a group of people are likely to visit and then infect those websites with malware that can affect visitors.

28
New cards

Brand Impersonation

(2.2 Common Threat Vector and Attack surfaces) Attackers pose as a well-known and trusted company or brand to deceive their targets.

29
New cards

Typo squatting

(2.2 Common Threat Vector and Attack Surfaces) Someone buys a domain name that is similar in name to a legitimate domain name.

30
New cards

Memory Injection

(2.3 Explain Various Types of Vulnerabilities) An attacker exploits a vulnerability and overwrites memory locations with their own code.

31
New cards

Buffer Overflow

(2.3 Explain Various types of Vulnerabilities) An application receives more input, or different input, than it expects.

32
New cards

Race Conditions

(2.3 Explain Various types of Vulnerabilities) When two or more applications attempt to access a resource simultaneously.

33
New cards

Time-of-check (TOC)/Time of Use (TOU)

(2.3 Explain Various types of Vulnerabilities) The attacker tries to race the Target of evaluation (TOE) system to do something malicious with data after the operating system verifies access is allowed (Time of Check) but before the operating system performs a legitimate action at the time of use. (Page 357)

34
New cards

Structured Query Language injection (SQLi)

(2.3 Explain Various types of Vulnerabilities) The attacker enters additional data into the webpage form to generate different SQL statements.

35
New cards

Cross-site Scripting (XSS)

(2.3 Explain Various types of Vulnerabilities) A web application vulnerability that allows attackers to inject scripts into web pages.

36
New cards

End-of-Life (EOL) Hardware

(2.3 Explain Various types of Vulnerabilities) Hardware that has reached the end of its useful life, either because it is no longer supported by the manufacturer or because it is too outdated.

37
New cards

Legacy Hardware

(2.3 Explain Various types of Vulnerabilities) The older computer hardware that is no longer being manufactured or widely used in the industry.

38
New cards

Virtualization

(2.3 Explain Various Types of Vulnerabilities) Allows multiple virtual servers to operate on a single physical server providing increased cybersecurity resilience with lower operating costs.

39
New cards

Virtual Machine (VM) Escape

(2.3 Explain Various types of Vulnerabilities) An attack that allows an attacker to access the host system from within a virtual guest system.

40
New cards

Resource Reuse

(2.3 Explain Various types of Vulnerabilities) The potential for data or resources to remain on a shared infrastructure even after a customer has finished using them,

41
New cards

Supply Chain

(2.3 Explain Various types of Vulnerabilities) Includes all the elements required to produce and sell a product.

42
New cards

Misconfiguration

(2.3 Explain Various types of Vulnerabilities) Can take down a server, disable a network, stop email communications, and even stop all network traffic for an entire enterprise.

43
New cards

Side Loading

(2.3 Explain Various types of Vulnerabilities) Copying an application package in the Application Packet Kit (APK) format to the device and then activating it.

44
New cards

Jailbreaking

(2.3 Explain Various types of Vulnerabilities) Removing all software restrictions from an apple device.

45
New cards

Zero-Day

(2.3 Explain Various types of Vulnerabilities) A vulnerability that is unknown to the vendor, so the vendor has not released a patch.

46
New cards

Ransomware

(2.4 Analyze Indicators of Malicious Activity) Malware takes control of a user’s system or data and there’s an attempt to extort payment from the victim.

47
New cards

Trojan

(2.4 Analyze Indicators of Malicious Activity) Something that appears to be useful, but includes a malicious component, such as installing a backdoor on a user’s system.

48
New cards

Worm

(2.4 Analyze Indicators of Malicious Activity) Self-replicating malware that travels throughout a network without the assistance of a host application or user interaction.

49
New cards

Spyware

(2.4 Analyze Indicators of Malicious Activity) Monitors a users computer and often includes a keylogger.

50
New cards

Bloatware

(2.4 Analyze Indicators of Malicious Activity) Describes programs a user may not want, even if they consented to downloading them.

51
New cards

Virus

(2.4 Analyze Indicators of Malicious Activity) Malicious code that attaches itself to a host application.

52
New cards

Keylogger

(2.4 Analyze Indicators of Malicious Activity) Capture a user’s keystrokes and store them in a file. The file is automatically sent to an attacker or manually retrieved depending on this.

53
New cards

Logic Bomb

(2.4 Analyze Indicators of Malicious Activity) Executes in response to an event, such as when a specific application is executed, or specific time arrives.

54
New cards

Rootkit

(2.4 Analyze Indicators of Malicious Activity) A program that gains administrative access on the system to provide the attacker with administrative privileges and hide the fact that the system has been infected or compromised by malicious code.

55
New cards

Brute Force

(2.4 Analyze Indicators of Malicious Activity) Attempt to simply crash right through physical security controls.

56
New cards

Radio Frequency Identification (RFID) cloning

(2.4 Analyze Indicators of Malicious Activity) An attacker could mimic the tag attached to a valuable object.

57
New cards

Environmental

(2.4 Analyze Indicators of Malicious Activity) Attacks revolving around the destruction of environmental conditions (i.e. Cutting off power to a facility, raising the temperature to cause equipment overheating, flooding it with water, or causing a similar catastrophe.

58
New cards

Distributed Denial of Service (DDoS)

(2.4 Analyze Indicators of Malicious Activity) An attack from two or more computers against a single target.

59
New cards

Amplified DDoS

(2.4 Analyze Indicators of Malicious Activity) It combines reflection techniques with amplification to generate even greater traffic directed at the target.

60
New cards

Reflected DDoS

(2.4 Analyze Indicators of Malicious Activity) An attacker sends requests to a third-party server with a spoofed IP address, which appears to be the target’s IP address.

61
New cards

Domain Name Attacks (DNS) attacks

(2.4 Analyze Indicators of Malicious Activity) Attempts to modify or corrupt DNS data stored on a DNS server.

62
New cards

On-Path (Man-in-the-middle) Attack

(2.4 Analyze Indicators of Malicious Activity) A form of active eavesdropping. It captures data from two other computers in a session.

63
New cards

Credential Replay

(2.4 Analyze Indicators of Malicious Activity) Replaying credentials that were part of a communication session.

64
New cards

SQL Injection (SQLi)

(2.4 Analyze Indicators of Malicious Activity) The attacker enters additional data into the webpage form to generate different SQL statements.

65
New cards

Buffer Overflow

(2.4 Analyze Indicators of Malicious Activity) An application receives more input, or different input than it expects.

66
New cards

Replay

(2.4 Analyze Indicators of Malicious Activity) an attacker replays data that was already part of a communication session.

67
New cards

Privilege Escalation

(2.4 Analyze Indicators of Malicious Activity) Penetration testers use these techniques to gain more access to target systems.

68
New cards

Forgery

(2.4 Analyze Indicators of Malicious Activity) An attacker creates a fake identity, certificate, file, or other object in an attempt to fool an unsuspecting user on the system.

69
New cards

Directory Transversal

(2.4 Analyze Indicators of Malicious Activity) Injection attack that attempts to access a file by including the full directory path or traversing the directory structure on the computer.

70
New cards

Downgrade

(2.4 Analyze Indicators of Malicious Activity) Attack that forces a system to downgrade its security.

71
New cards

Collision (Hash Collision)

(2.4 Analyze Indicators of Malicious Activity) The hashing algorithm creates the same hash from different inputs.

72
New cards

Birthday

(2.4 Analyze Indicators of Malicious Activity) An attacker attempts to create a password that produces the same hash as the users actual password.

73
New cards

Spraying

(2.4 Analyze Indicators of Malicious Activity) An automated program starts with a large list of targeted user accounts. It then picks a password and tries it against every account in the list. It then picks another password and loops through the list again.

74
New cards

Brute Force

(2.4 Analyze Indicators of Malicious Activity) Attempts to guess all password combinations.

75
New cards

Indicators

(2.4 Analyze Indicators of Malicious Activity) Account lockouts, Concurrent session usage, Impossible travel time, Blocked content, Resource Consumption, Resource inaccessibility, Log anomolies, Out-of-Cycle logging, Published/Documented, Missing Logs

76
New cards

Segmentation

(2.5 Purpose of Mitigation Techniques) Places the system on an isolated network.

77
New cards

Access Control

(2.5 Purpose of Mitigation Techniques) Ensures that only authenticated and authorized entities can access resources. Ensures that only authenticated users who have been granted appropriate permissions can access files on a server.

78
New cards

Access Control List (ACLs)

(2.5 Purpose of Mitigation Techniques) Rules are implemented on routers (and on firewalls) to identify what traffic is defined.

79
New cards

Application Allow List

(2.5 Purpose of Mitigation Techniques) A list of authorized software, and it prevents users from installing or running software that isn’t on the list.

80
New cards

Application Block List

(2.5 Purpose of Mitigation Techniques) A list of unauthorized software and prevents users from installing or running software on the list.

81
New cards

Isolation

(2.5 Purpose of Mitigation Techniques) Ensures that one network isn’t connected to another network.

82
New cards

Patching

(2.5 Purpose of Mitigation Techniques) Ensuring that systems and applications stay up to date with current patches.

83
New cards

Encryption

(2.5 Purpose of Mitigation Techniques) Scrambles fata to make it unreadable by unauthorized personnel.

84
New cards

Monitoring

(2.5 Purpose of Mitigation Techniques) Includes routine security audits, regular reviews of access logs, ongoing vulnerability scanning, and analysis of incident response metrics.

85
New cards

Least Privelege

(2.5 Purpose of Mitigation Techniques) Individuals are only granted the privileges that they need to perform their assigned tasks or functions, but no more.

86
New cards

Configuration Management

(2.5 Purpose of Mitigation Techniques) Help organizations deploy systems with secure configurations and enforce requirements that those secure configurations remain in place.

87
New cards

Decommissioning

(2.5 Purpose of Mitigation Techniques) Retiring hardware that is no longer in use.

88
New cards

Host-Based firewall

7(2.5 Purpose of Mitigation Techniques) Monitors traffic going in and out of a single host.

89
New cards

Host-Based Intrusion Prevention System (HIPS)

(2.5 Purpose of Mitigation Techniques) Uses behavior analysis, file integrity monitoring, and application control to prevent unauthorized access, tampering, or other types of attacks.