CompTIA Security+ Section 2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/36

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

37 Terms

1
New cards

What is data exfiltration?

Unauthorized transfer of sensitive data.

2
New cards

What motivates financial gain attacks?

Money from ransomware or banking trojans.

3
New cards

What is blackmail in cybersecurity?

Threatening to leak data unless paid.

4
New cards

What is a service disruption?

Attack that stops services, like DDoS.

5
New cards

What is hacktivism?

Hacking for political or social causes.

6
New cards

What is ethical hacking?

Finding security issues to help fix them.

7
New cards

What motivates revenge attacks?

Personal payback, often by ex-employees.

8
New cards

Why do some hack for chaos?

They enjoy causing harm or disruption.

9
New cards

What is cyber espionage?

Spying to steal sensitive info.

10
New cards

What is cyber war?

Attacks to damage enemy infrastructure.

11
New cards

What are internal threat actors?

People inside an org who misuse access.

12
New cards

What are external threat actors?

People outside trying to hack in.

13
New cards

Why do resources matter for attackers?

More tools = stronger attack ability.

14
New cards

What are low-skilled attackers called?

Script kiddies.

15
New cards

What are script kiddies?

Unskilled users who rely on tools.

16
New cards

What is a hacktivist?

Person who hacks for a cause.

17
New cards

What is cyber organized crime?

Groups hacking for money.

18
New cards

Who are nation-state actors?

Government-backed hackers.

19
New cards

What is a false flag attack?

Making it seem like someone else did it.

20
New cards

What is an insider threat?

Internal user who causes harm.

21
New cards

What is shadow IT?

Tech used without IT approval.

22
New cards

What is stealth IT?

Another name for shadow IT.

23
New cards

What is unsanctioned technology?

Unauthorized tech used in a workplace.

24
New cards

What is BYOD?

Using personal devices for work.

25
New cards

What is a threat vector?

Path used to launch an attack.

26
New cards

What are attack surfaces?

All points where a system is vulnerable.

27
New cards

What are deception technologies?

Tools like honeypots to trick attackers.

28
New cards

What are disruption technologies?

Tools used to confuse or stop attackers.

29
New cards

What is a honeypot?

Fake system meant to lure attackers.

30
New cards

What are honeynets?

Network of honeypots to catch attackers.

31
New cards

What are honeyfiles?

Fake files designed to trigger alerts.

32
New cards

What are honeytokens?

Fake credentials or data used to detect misuse.

33
New cards

What are bogus DNS entries?

Fake domain names set to mislead attackers.

34
New cards

What are decoy directories?

Fake folders set up to bait attackers.

35
New cards

What is dynamic page generation?

Pages that change based on activity to trap attackers.

36
New cards

What is port triggering?

Opens a port when certain traffic is seen.

37
New cards

What is spoofing fake telemetry data?

Sending false system info to confuse attackers.