Security+ Cert Exam Objectives SYO-601

0.0(0)
studied byStudied by 1 person
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/785

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

786 Terms

1
New cards

Phishing

fraudulent attempt to obtain sensitive information or data, by disguising oneself as a trustworthy entity in an electronic communication.

2
New cards

Smishing

When someone tries to trick you into giving them your private information via a text or SMS message.

3
New cards

Vishing

Using social engineering over the telephone system to gain access to private personal and financial information for the purpose of financial reward

4
New cards

Spam

irrelevant or unsolicited messages sent to a large number of Internet users, for illegitimate advertising, and other activities such as phishing, and spreading malware

5
New cards

SPIM

Spam delivered through instant messaging (IM) instead of through e-mail messaging

6
New cards

Spear Phishing

the act of sending emails to specific and well-researched targets while pretending to be a trusted sender

7
New cards

Dumpster Diving

exploration of a system's trash bin for the purpose of finding details in order for a hacker to have a successful online assault.

8
New cards

Shoulder Surfing

When someone watches over your shoulder to nab valuable information as you key it into an electronic device.

9
New cards

Pharming

cyberattack intended to redirect a website's traffic to another, fake site.

10
New cards

Tailgating

Social engineering attempt by cyber threat actors in which they trick employees into helping them gain unauthorized access into the company premises.

11
New cards

Eliciting Information

Procedures or techniques involving interacting with and communicating with others that is designed to gather knowledge or inform

12
New cards

Whaling

Spear phishing that focuses on one specific high level executive or influencer

13
New cards

Prepending

Prepend is a word that means to attach content as a prefix. For example, a prepend command could be used in a scripting language that a programmer would enter into a certain function or code module. It would add certain characters of text to the beginning of some variable or object.

14
New cards

Identity Fraud

identity fraud is the use of stolen information such as making fake ID's and fake bank accounts

15
New cards

Invoice Scams

using fraudulent invoices to steal from a company

16
New cards

Credential Harvesting

the use of MITM attacks, DNS poisoning, phishing, etc. to amass large numbers of credentials (username / password combinations) for reuse.

17
New cards

Reconnaissance

- Information gathering about a target network

18
New cards

Hoax

Cyber hoax scams are attacks that exploit unsuspecting users to provide valuable information, such as login credentials or money.

19
New cards

Impersonation

typically involves an email that seems to come from a trusted source.

20
New cards

Watering hole attack

security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit. The goal is to infect a targeted user's computer and gain access to the network at the target's place of employment.

21
New cards

Typo squatting

type of cybersquatting used by imposters that involve registering domains with intentionally misspelled names of popular web addresses to install malware on the user's system

22
New cards

Pretexting

the practice of presenting oneself as someone else in order to obtain private information.

23
New cards

Influence campaigns

24
New cards

Hybrid warfare

- Combining conventional warfare with cyberwarfare

25
New cards

Social Media Campaign

Planned, coordinated marketing efforts using one or more social media platforms.

26
New cards

Principles:

Authority: an attacker may try to appear to have a certain level authority.

Intimidation: may try to make the victim think that something terrible is going to happen if they don't comply with the attacker's wishes.

Consensus: An attacker may try to sway the mind of a victim using names they are familiar with, saying that such ones provided them information (they are fishing for) in the past and you should be able to do the same.

Scarcity: An attacker may try to set a time limit on a victim so that they can comply with their wishes by a certain deadline.

Familiarity: they make you familiar with them on the phone and make you want to do things for them.

Trust: The attacker in this case can claim to be a friend or close associate of someone you may know very well and that's trusted.

Urgency: When attackers want you to act and not think, they want you to do what they want as quickly as possible so that there's no time to spot all the red flags.

27
New cards

Malware

a program or file designed to be disruptive, invasive and harmful to your computer.

28
New cards

Ransomware

Software that encrypts programs and data until a ransom is paid to remove it.

29
New cards

Worms

Independent computer programs that copy themselves from one computer to other computers over a network

30
New cards

potentially unwanted program (PUP)

program that installs itself on a computer, typically without the user's informed consent

31
New cards

Fileless virus

Software that uses legitimate programs to infect a computer. It does not rely on files and leaves no footprint, making it challenging to detect and remove.

32
New cards

command and control

A computer controlled by an attacker or cybercriminal which is used to send commands to systems compromised by malware and receive stolen data from a target network

33
New cards

Bots

self-propagating malware that infects its host and connects back to a central server(s).

34
New cards

Cryptomalware

Malware to remain in place for as long as possible, quietly mining in the background.

35
New cards

logic bomb

A computer program or part of a program that lies dormant until it is triggered by a specific logical event.

36
New cards

Spyware

Type of malware that infects your PC or mobile device and gathers information about you, including the sites you visit, the things you download, your usernames and passwords, payment information, and the emails you send and receive.

37
New cards

Keyloggers

software that tracks or logs the keys struck on your keyboard, typically in a covert manner so that you don't know that your actions are being monitored.

38
New cards

Remote Access Trojan

type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim's machine.

39
New cards

Rootkit

software program, typically malicious, that provides privileged, root-level (i.e., administrative) access to a computer while concealing its presence on that machine

40
New cards

Backdoor

refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application.

41
New cards

Password Attack

Any type of attack in which the attacker

attempts to obtain and make use of passwords illegitimately.

42
New cards

Spraying password attack

43
New cards

Dictionary password attack

An attack method that takes all the words from a dictionary file and attempts to log on by entering each dictionary entry as a password.

44
New cards

brute force password attack (offline and online)

an attempt to guess a password by attempting every possible combination of characters and numbers in it

45
New cards

Rainbow Tables

an attack on a password that uses a large pregenerated data set of hashes from nearly every possible password

46
New cards

Plaintext/unencrypted password attack

47
New cards

Malicious universal serial bus (USB) cable

48
New cards

Malicious flash drive

49
New cards

Card cloning

50
New cards

Skimming

51
New cards

Adversarial artificial intelligence (AI)

1. Tainted training for machine learning (ML)

2. Security of machine learning algorithms

52
New cards

Supply-chain attacks

53
New cards

Cloud-based vs. on-premises attacks

54
New cards

Cryptographic attacks

1. Birthday:

2. Collision:

3. Downgrade:

55
New cards

Privilege escalation

56
New cards

Cross-site scripting

57
New cards

Injections

58
New cards

Structured query language (SQL)

59
New cards

Dynamic link library

60
New cards

Lightweight directory access protocol (LDAP)

61
New cards

Extensible markup language (XML)

62
New cards

Pointer/object dereference

63
New cards

Directory traversal

64
New cards

Buffer overflows

65
New cards

Race conditions(Time of check/time of use)

66
New cards

Error handling

67
New cards

Improper input handling

68
New cards

Replay attack (session replays)

69
New cards

Integer overflow

70
New cards

Request forgeries

1. Server-side

2. Cross-site

71
New cards

Application programming interface (API) attacks

72
New cards

Resource exhaustion

73
New cards

Memory leak

74
New cards

Secure sockets layer (SSL) stripping

75
New cards

Driver manipulation

76
New cards

Shimming

77
New cards

Refactoring

78
New cards

Pass the hash

79
New cards

Wireless Evil Twin

80
New cards

Rogue access point

81
New cards

Bluesnarfing

82
New cards

Bluejacking

Some users with Bluetooth-enabled mobiles use this technology to send anonymous text messages to strangers.

83
New cards

Disassociation

84
New cards

Jamming

85
New cards

Radio frequency identifier (RFID)

86
New cards

Near Field Communication (NFC)

A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity.

87
New cards

Initialization Vector (IV)

A 24-bit value used in WEP that changes each time a packet is encrypted.

88
New cards

On-path attack(Man-in-the-middle)

89
New cards

Layer 2 attacks

90
New cards

Address resolution protocol poisoning

91
New cards

Media access control flooding

92
New cards

MAC Cloning

93
New cards

Domain Name System (DNS)

A hierarchical system for naming resources on the Internet.

94
New cards

Domain jacking

95
New cards

DNS poisoning

Technique used by criminals to alter DNS records and drive users to fake sites, to committing phishing.

96
New cards

Universal resource locator redirection

97
New cards

Domain reputation

98
New cards

Distributed Denial of Service (DDoS)

An attack that uses many computers to perform a DoS attack.

99
New cards

DDOS network

100
New cards

DDOS application