100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Security+ Exam Objectives SYO-601 | 788 Questions and Answers 100% Verified

Rating
-
Sold
-
Pages
113
Grade
A+
Uploaded on
18-09-2023
Written in
2023/2024

Phishing - Fraudulent attempt to obtain sensitive information or data, by disguising oneself as a trustworthy entity in an electronic communication. Smishing - When someone tries to trick you into giving them your private information via a text or SMS message. Vishing - Using social engineering over the telephone system to gain access to private personal and financial information for the purpose of financial reward Spam - Irrelevant or unsolicited messages sent to a large number of Internet users, for illegitimate advertising, and other activities such as phishing, and spreading malware SPIM - Spam delivered through instant messaging (IM) instead of through e-mail messaging Spear Phishing - The act of sending emails to specific and well-researched targets while pretending to be a trusted sender Dumpster Diving - Exploration of a system's trash bin for the purpose of finding details in order for a hacker to have a successful online assault. Shoulder Surfing - When someone watches over your shoulder to nab valuable information as you key it into an electronic device. Pharming - Cyberattack intended to redirect a website's traffic to another, fake site. Tailgating - Social engineering attempt by cyber threat actors in which they trick employees into helping them gain unauthorized access into the company premises.Eliciting Information - Procedures or techniques involving interacting with and communicating with others that is designed to gather knowledge or inform Whaling - Spear phishing that focuses on one specific high level executive or influencer Prepending - Prepend is a word that means to attach content as a prefix. For example, a prepend command could be used in a scripting language that a programmer would enter into a certain function or code module. It would add certain characters of text to the beginning of some variable or object. Identity Fraud - Identity fraud is the use of stolen information such as making fake ID's and fake bank accounts Invoice Scams - Using fraudulent invoices to steal from a company Credential Harvesting - The use of MITM attacks, DNS poisoning, phishing, etc. to amass large numbers of credentials (username / password combinations) for reuse. Reconnaissance - Information gathering about a target network

Show more Read less
Institution
Security+ Objectives SYO-601
Module
Security+ Objectives SYO-601











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Security+ Objectives SYO-601
Module
Security+ Objectives SYO-601

Document information

Uploaded on
September 18, 2023
Number of pages
113
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
PatrickKaylian Delaware State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1816
Member since
2 year
Number of followers
1043
Documents
22126
Last sold
17 hours ago

3.8

316 reviews

5
147
4
60
3
54
2
15
1
40

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions