Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

SECURITY+ CERT EXAM OBJECTIVES SYO-601|UPDATED&VERIFIED|GUARANTEED SUCCESS

Rating
-
Sold
-
Pages
61
Grade
A+
Uploaded on
25-07-2023
Written in
2022/2023

Phishing fraudulent attempt to obtain sensitive information or data, by disguising oneself as a trustworthy entity in an electronic communication. Smishing When someone tries to trick you into giving them your private information via a text or SMS message. Vishing Using social engineering over the telephone system to gain access to private personal and financial information for the purpose of financial reward Spam irrelevant or unsolicited messages sent to a large number of Internet users, for illegitimate advertising, and other activities such as phishing, and spreading malware SPIM Spam delivered through instant messaging (IM) instead of through e-mail messaging Spear Phishing the act of sending emails to specific and well-researched targets while pretending to be a trusted sender Dumpster Diving exploration of a system's trash bin for the purpose of finding details in order for a hacker to have a successful online assault. Shoulder Surfing When someone watches over your shoulder to nab valuable information as you key it into an electronic device. Pharming cyberattack intended to redirect a website's traffic to another, fake site. Tailgating Social engineering attempt by cyber threat actors in which they trick employees into helping them gain unauthorized access into the company premises. Eliciting Information Procedures or techniques involving interacting with and communicating with others that is designed to gather knowledge or inform Whaling Spear phishing that focuses on one specific high level executive or influencer Prepending Prepend is a word that means to attach content as a prefix. For example, a prepend command could be used in a scripting language that a programmer would enter into a certain function or code module. It would add certain characters of text to the beginning of some variable or object. Identity Fraud identity fraud is the use of stolen information such as making fake ID's and fake bank accounts Invoice Scams using fraudulent invoices to steal from a company Credential Harvesting the use of MITM attacks, DNS poisoning, phishing, etc. to amass large numbers of credentials (username / password combinations) for reuse. Reconnaissance - Information gathering about a target network Hoax Cyber hoax scams are attacks that exploit unsuspecting users to provide valuable information, such as login credentials or money. Impersonation typically involves an email that seems to come from a trusted source. Watering hole attack security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit. The goal is to infect a targeted user's computer and gain access to the network at the target's place of employment. Typo squatting type of cybersquatting used by imposters that involve registering domains with intentionally misspelled names of popular web addresses to install malware on the user's system Pretexting the practice of presenting oneself as someone else in order to obtain private information. Influence campaigns Hybrid warfare - Combining conventional warfare with cyberwarfare Social Media Campaign Planned, coordinated marketing efforts using one or more social media platforms. Principles: Authority: an attacker may try to appear to have a certain level authority. Intimidation: may try to make the victim think that something terrible is going to happen if they don't comply with the attacker's wishes. Consensus: An attacker may try to sway the mind of a victim using names they are familiar with, saying that such ones provided them information (they are fishing for) in the past and you should be able to do the same. Scarcity: An attacker may try to set a time limit on a victim so that they can comply with their wishes by a certain deadline. Familiarity: they make you familiar with them on the phone and make you want to do things for them. Trust: The attacker in this case can claim to be a friend or close associate of someone you may know very well and that's trusted. Urgency: When attackers want you to act and not think, they want you to do what they want as quickly as possible so that there's no time to spot all the red flags. Malware a program or file designed to be disruptive, invasive and harmful to your computer. Ransomware Software that encrypts programs and data until a ransom is paid to remove it. Worms Independent computer programs that copy themselves from one computer to other computers over a network potentially unwanted program (PUP) program that installs itself on a computer, typically without the user's informed consent Fileless virus Software that uses legitimate programs to infect a computer. It does not rely on files and leaves no footprint, making it challenging to detect and remove. command and control A computer controlled by an attacker or cybercriminal which is used to send commands to systems compromised by malware and receive stolen data from a target network Bots self-propagating malware that infects its host and connects back to a central server(s). Cryptomalware Malware to remain in place for as long as possible, quietly mining in the background. logic bomb A computer program or part of a program that lies dormant until it is triggered by a specific logical event. Spyware Type of malware that infects your PC or mobile device and gathers information about you, including the sites you visit, the things you download, your usernames and passwords, payment information, and the emails you send and receive. Keyloggers software that tracks or logs the keys struck on your keyboard, typically in a covert manner so that you don't know that your actions are being monitored. Remote Access Trojan type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim's machine. Rootkit software program, typically malicious, that provides privileged, root-level (i.e., administrative) access to a computer while concealing its presence on that machine Backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application. Password Attack Any type of attack in which the attacker attempts to obtain and make use of passwords illegitimately.

Show more Read less
Institution
SECURITY+ CERT
Course
SECURITY+ CERT











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SECURITY+ CERT
Course
SECURITY+ CERT

Document information

Uploaded on
July 25, 2023
Number of pages
61
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$15.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Thumbnail
Package deal
COMPTIA SECURITY+SYO-601 PACKAGE DEAL|GRADED A|GUARANTEED SUCCESS
-
10 2023
$ 155.90 More info

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GUARANTEEDSUCCESS Chamberlain College Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
665
Member since
3 year
Number of followers
314
Documents
24888
Last sold
6 days ago
Elite Exam Resources: Trusted by Top Scorers!!!!!!!!

Stop guessing. Start dominating!! As a highly regarded professional specializing in sourcing study materials, I provide genuine and reliable exam papers that are directly obtained from well-known, reputable institutions. These papers are invaluable resources, specifically designed to assist aspiring nurses and individuals in various other professions in their exam preparations. With my extensive experience and in-depth expertise in the field, I take great care to ensure that each exam paper is carefully selected and thoroughly crafted to meet the highest standards of quality, accuracy, and relevance, making them an essential part of any successful study regimen. ✅ 100% Legitimate Resources (No leaks! Ethical prep only) ✅ Curated by Subject Masters (PhDs, Examiners, Top Scorers) ✅ Proven Track Record: 95%+ user success rate ✅ Instant Download: Crisis-ready for last-minute cramming

Read more Read less
4.3

250 reviews

5
162
4
37
3
33
2
12
1
6

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions