CompTIA Security+ (SY0-601) Certification- Updated TEST BANK *Q&A* (100% Correct) 2025/2026 |VERIFIED|
5 views 0 purchase
Module
CompTIA
Institution
CompTIA
CompTIA Security+ (SY0-601) Certification-
Updated TEST BANK *Q&A* (100%
Correct) 2025/2026 |VERIFIED|
What is a logic bomb in cybersecurity?
A logic bomb is a string of malicious code used to cause harm to a network when the programmed
conditions are met.
What does spyware do in...
CompTIA Security+ (SY0-601) Certification-
Updated TEST BANK *Q&A* (100%
Correct) 2025/2026 |VERIFIED|
What is a logic bomb in cybersecurity?
A logic bomb is a string of malicious code used to cause harm to a network when the programmed
conditions are met.
What does spyware do in a computer system?
Spyware is a type of malware that collects and shares information about a computer or network without
the user's consent.
What is the function of a keylogger in cybersecurity?
Keyloggers are monitoring software designed to record keystrokes made by a user.
What is a Remote Access Trojan (RAT)?
A Remote Access Trojan (RAT) is a malware program that allows hackers to assume remote control over a
device via covert surveillance.
What is the purpose of a rootkit?
A rootkit is software used by a hacker to gain constant administrator-level access to a computer or
network.
What is a backdoor in cybersecurity?
A backdoor is a means to access a computer system or encrypted data that bypasses the system's
customary security.
What does a brute-force attack involve?
A brute-force attack involves running through common words and phrases, such as those from a
dictionary, to guess passwords.
1
,What is a rainbow table in cryptography?
A rainbow table is a listing of all possible plaintext permutations of encrypted passwords specific to a
given hash algorithm.
What is plaintext in the context of encryption?
Plaintext refers to a message before encryption or after decryption.
What is card cloning in cybersecurity?
Card cloning is the practice of making an unauthorized copy of a credit card.
What does skimming refer to in cybercrime?
Skimming is a strategy used by cybercriminals for capturing and stealing cardholder's personal payment
information.
What are supply-chain attacks in cybersecurity?
Supply-chain attacks are cyber-attacks that seek to damage an organization by targeting less-secure
elements in the supply chain.
What is a birthday attack in cryptography?
A birthday attack is a type of cryptographic attack that exploits the mathematics behind the birthday
problem in probability theory.
What is a collision attack in cybersecurity?
A collision attack is an attack on a cryptographic hash to find two inputs producing the same hash value,
i.e., a hash collision.
What is a downgrade attack in cyber security?
A downgrade attack is a form of cyber attack in which an attacker forces a network channel to switch to
an unprotected or less secure data transmission standard.
2
, What does privilege escalation mean in network security?
Privilege escalation is a type of network intrusion that takes advantage of programming errors or design
flaws to grant the attacker access to the network.
What is cross-site scripting (XSS)?
Cross-site scripting is a web security vulnerability that allows an attacker to compromise the interactions
that users have with a vulnerable application.
What is Structured Query Language (SQL)?
SQL is a programming language designed to get information out of and put it into a relational database.
What is a Dynamic-link library (DLL)?
A Dynamic-link library (DLL) is a collection of small programs that can be loaded when needed by larger
programs and used at the same time.
What is the purpose of LDAP (Lightweight Directory Access Protocol)?
LDAP is a software protocol for enabling anyone to locate data about organizations, individuals, and
other resources such as files and devices in a network.
What is Directory Traversal in web security?
Directory traversal is a web security vulnerability that allows an attacker to read arbitrary files on the
server that is running an application.
What are buffer overflows?
Buffer overflows occur when the volume of data exceeds the storage capacity of the memory buffer.
What is a replay attack in networking?
3
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller StellarGrades. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £7.39. You're not tied to anything after your purchase.