CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Rate it:
Open Preview
49%
Flag icon
Remember this A social engineer can gain unauthorized information just by looking over someone’s shoulder. This might be in person, such as when a user is at a computer, or remotely using a camera. Screen filters help prevent shoulder surfing by obscuring the view for people unless they are directly in front of the monitor.
49%
Flag icon
A hoax is a message, often circulated through email, that tells of impending doom from a virus or other security threat that simply doesn’t exist.
49%
Flag icon
Tailgating is the practice of one person following closely behind another without showing credentials.
49%
Flag icon
guards. A simple mantrap can be a turnstile like those used in subways or bus stations.
49%
Flag icon
Dumpster diving is the practice of searching through trash or recycling containers to gain information from discarded documents.
50%
Flag icon
Remember this Dumpster divers search through trash looking for information. Shredding or burning papers instead of throwing them away mitigates this threat.
50%
Flag icon
A watering hole attack attempts to discover which web sites a group of people are likely to visit and then infects those web sites with malware that can infect the visitors.
50%
Flag icon
Spam is unwanted or unsolicited email.
50%
Flag icon
Phishing is the practice of sending email to users with the purpose of tricking them into revealing personal information or clicking on a link.
50%
Flag icon
Remember this Spam is unwanted email. Phishing is malicious spam. Attackers attempt to trick users into revealing sensitive or personal information or clicking on a link. Links within email can also lead unsuspecting users to install malware.
50%
Flag icon
Spear phishing is a targeted form of phishing. Instead of sending the email out to everyone indiscriminately, a spear phishing attack attempts to target specific groups of users, or even a single user.
50%
Flag icon
Whaling is a form of spear phishing that attempts to target high-level executives.
50%
Flag icon
Remember this A spear phishing attack targets specific groups of users. It could target employees within a company or customers of a company. Digital signatures provide assurances to recipients about who sent an email, and can reduce the success of spear phishing. Whaling targets high-level executives.
50%
Flag icon
Vishing attacks use the phone system to trick users into giving up personal and financial information. It often uses Voice over IP (VoIP) technology
50%
Flag icon
Remember this Vishing is a form of phishing that uses the phone system or VoIP. Some vishing attempts are fully automated. Others start automated but an attacker takes over at some point during the call.
51%
Flag icon
Remember this Antivirus software detects and removes malware, such as viruses, Trojans, and worms. Signature-based antivirus software detects known malware based on signature definitions. Heuristic-based software detects previously unknown malware based on behavior.
51%
Flag icon
Data execution prevention (DEP) is a security feature that prevents code from executing in memory regions marked as nonexecutable.
51%
Flag icon
Advanced Malware Protection (AMP)
51%
Flag icon
The challenge with any spam filter is to only filter out spam, and never filter out actual email.
51%
Flag icon
a zero-day vulnerability is a vulnerability or bug that is unknown to trusted sources, such as operating system and antivirus vendors.
52%
Flag icon
Remember this Educating users about new viruses, phishing attacks, and zero-day exploits helps prevent incidents. Zero-day exploits take advantage of vulnerabilities that aren’t known by trusted sources, such as operating system vendors and antivirus vendors.
52%
Flag icon
Remember this Many of the reasons that social engineers are effective are because they use psychology-based techniques to overcome users’ objections. Scarcity and urgency are two techniques that encourage immediate action.
52%
Flag icon
B.
52%
Flag icon
A.
53%
Flag icon
C.
53%
Flag icon
B.
53%
Flag icon
C.
53%
Flag icon
A.
53%
Flag icon
B.
53%
Flag icon
D.
53%
Flag icon
B.
53%
Flag icon
B.
53%
Flag icon
B.
53%
Flag icon
D.
53%
Flag icon
A.
53%
Flag icon
B.
53%
Flag icon
D.
54%
Flag icon
A denial-of-service (DoS) attack is an attack from one attacker against one target. A distributed denial-of-service (DDoS) attack is an attack from two or more computers against     a single target.
54%
Flag icon
Remember this A denial-of-service (DoS) attack is an attack from a single source that attempts to disrupt the services provided by another system. A distributed denial-of-service (DDoS) attack includes multiple computers attacking a single target. DDoS attacks typically include sustained, abnormally high network traffic.
54%
Flag icon
privilege escalation tactics that attackers often use. For example, attackers often use remote access Trojans (RATs) to gain access to a single system.
54%
Flag icon
Spoofing occurs when one person or entity impersonates or masquerades as someone or something else.
54%
Flag icon
However, it’s possible to use software methods to associate a different MAC address to the NIC in a MAC spoofing attack.
54%
Flag icon
In an IP spoofing attack, the attacker changes the source address so that it looks like the IP packet originated from a different source.
54%
Flag icon
Remember this Spoofing attacks typically change data to impersonate another system or person. MAC spoofing attacks change the source MAC address and IP spoofing attacks change the source IP address.
54%
Flag icon
servers on the Internet.
54%
Flag icon
The SYN flood attack disrupts the TCP handshake process and can prevent legitimate clients from connecting.
54%
Flag icon
A man-in-the-middle(MITM) attack is a form of active interception or active eavesdropping.
54%
Flag icon
Address Resolution Protocol (ARP) poisoning is one way that an attacker can launch an MITM attack.
54%
Flag icon
ARP poisoning is an attack that misleads computers or switches about the actual MAC address of a system.
54%
Flag icon
Remember this ARP poisoning attacks attempt to mislead systems about the actual MAC address of a system. ARP poisoning is sometimes used in man-in-the-middle attacks.
1 10 16