Security+ Exam Objectives SYO-601 | 788 Questions and Answers 100% Verified
Phishing - Fraudulent attempt to obtain sensitive information or data, by disguising oneself as a trustworthy entity in an electronic communication. Smishing - When someone tries to trick you into giving them your private information via a text or SMS message. Vishing - Using social engineering over the telephone system to gain access to private personal and financial information for the purpose of financial reward Spam - Irrelevant or unsolicited messages sent to a large number of Internet users, for illegitimate advertising, and other activities such as phishing, and spreading malware SPIM - Spam delivered through instant messaging (IM) instead of through e-mail messaging Spear Phishing - The act of sending emails to specific and well-researched targets while pretending to be a trusted sender Dumpster Diving - Exploration of a system's trash bin for the purpose of finding details in order for a hacker to have a successful online assault. Shoulder Surfing - When someone watches over your shoulder to nab valuable information as you key it into an electronic device. Pharming - Cyberattack intended to redirect a website's traffic to another, fake site. Tailgating - Social engineering attempt by cyber threat actors in which they trick employees into helping them gain unauthorized access into the company premises.Eliciting Information - Procedures or techniques involving interacting with and communicating with others that is designed to gather knowledge or inform Whaling - Spear phishing that focuses on one specific high level executive or influencer Prepending - Prepend is a word that means to attach content as a prefix. For example, a prepend command could be used in a scripting language that a programmer would enter into a certain function or code module. It would add certain characters of text to the beginning of some variable or object. Identity Fraud - Identity fraud is the use of stolen information such as making fake ID's and fake bank accounts Invoice Scams - Using fraudulent invoices to steal from a company Credential Harvesting - The use of MITM attacks, DNS poisoning, phishing, etc. to amass large numbers of credentials (username / password combinations) for reuse. Reconnaissance - Information gathering about a target network
Written for
- Institution
- Security+ Objectives SYO-601
- Module
- Security+ Objectives SYO-601
Document information
- Uploaded on
- September 18, 2023
- Number of pages
- 113
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
security objectives syo 601
Also available in package deal