2.5 - CompTIA A+ Core 2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

Phishing

A social engineering attack that involves impersonation of a legitimate organization, often delivered by email or text.

2
New cards

Vishing

A phishing attack conducted over a phone call.

3
New cards

Smishing/SMS-shing

A phishing attack conducted with SMS messages.

4
New cards

Spear phishing

A targeted phishing attack designed to deceive a specific person or group by using personal information.

5
New cards

Whaling

A phishing attack targeting senior-level executives, such as CEOs or CFOs.

6
New cards

Shoulder surfing

A social engineering attack involving someone looking over a target's shoulder to see sensitive information.

7
New cards

Tailgating

A security breach method where an unauthorized person follows an authorized individual into a secured area, WITHOUT the authorized person’s knowledge.

8
New cards

Piggybacking

A similar security breach method to tailgating, where an authorized person allows an unauthorized individual to gain access to a secured area, often done without knowledge that the person is unauthorized.

9
New cards

Impersonation

Pretending to be someone else to gain unauthorized access to systems or sensitive information.

10
New cards

Dumpster diving

Searching through trash or recycling bins to find discarded items that may provide personal information.

11
New cards

Evil twin

A spoofing attack where an attacker creates a fraudulent Wi-Fi access point that appears to be legitimate. Use encryption (HTTPS and a VPN) to mitigate.

12
New cards

Denial of service (DoS)

A cyber attack where an attacker overloads a service to cause it to fail.

13
New cards

Distributed denial of service (DDoS)

A type of DoS attack using multiple compromised systems to flood a target with traffic.

14
New cards

Zero-day Attacks

Attacks that exploit unpatched vulnerabilities in software before a fix is released.

15
New cards

Common Vulnerabilities or Exposures Database (CVE)

Database offered by the MITRE corporation that tracks vulnerabilities and the operating systems/software they target.

16
New cards

On-path attack

An attack where an attacker intercepts communication between two devices. The attacker can read and alter the data sent between the two devices.

17
New cards

ARP poisoning attack

Occurs when an attacker manipulates the Address Resolution Protocol (ARP) cache in a network, allowing them to intercept traffic intended for a different device by associating their MAC address with the IP address of the target device.

18
New cards

Brute-force attack

A password attack that attempts every possible combination of characters to find the correct password.

19
New cards

Dictionary attack

A password attack using a predefined list of words and phrases (a wordlist) to guess the user's password.

20
New cards

Insider Threats

Risks that originate from within an organization due to employees or contractors exploiting their access.

21
New cards

SQL injection

A security attack that manipulates a database by using crafted SQL queries.

22
New cards

Cross-site scripting (XSS)

An injection attack where malicious scripts are inserted into trusted websites.

23
New cards

Non-compliant systems

Systems that fail to adhere to established security controls or standards.

24
New cards

Unpatched systems

Systems that are missing relevant OS manufacturer patches or software updates.

25
New cards

Unprotected systems

Systems missing crucial security components like antivirus or firewall. Mitigation requires balancing application troubleshooting (that often requires disabling security components) without removing security controls.

26
New cards

End of life (EOL)

A point when a manufacturer stops providing updates for software, leaving it vulnerable.

27
New cards

Bring your own device (BYOD)

A policy allowing employees to use personal devices for work, raising security concerns.

28
New cards

Spoofing

A fraudulent practice where an attacker disguises themselves as a legitimate entity, often through techniques like email spoofing, MAC address spoofing, or IP address spoofing.