100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

SYO-601 LATEST QUESTIONS AND VERIFIED ANSWERS

Rating
-
Sold
-
Pages
61
Grade
A+
Uploaded on
25-04-2025
Written in
2024/2025

SYO-601 LATEST QUESTIONS AND VERIFIED ANSWERS Phishing - CORRECT ANSWERfraudulent attempt to obtain sensitive information or data, by disguising oneself as a trustworthy entity in an electronic communication.

Institution
SYO-601
Course
SYO-601











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SYO-601
Course
SYO-601

Document information

Uploaded on
April 25, 2025
Number of pages
61
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • syo 601

Content preview

SYO-601 LATEST QUESTIONS AND VERIFIED ANSWERS
Phishing - CORRECT ANSWER✅✅✅fraudulent attempt to obtain sensitive information or data, by
disguising oneself as a trustworthy entity in an electronic communication.



Smishing - CORRECT ANSWER✅✅✅When someone tries to trick you into giving them your private
information via a text or SMS message.



Vishing - CORRECT ANSWER✅✅✅Using social engineering over the telephone system to gain access
to private personal and financial information for the purpose of financial reward



Spam - CORRECT ANSWER✅✅✅irrelevant or unsolicited messages sent to a large number of
Internet users, for illegitimate advertising, and other activities such as phishing, and spreading malware



SPIM - CORRECT ANSWER✅✅✅Spam delivered through instant messaging (IM) instead of through
e-mail messaging



Spear Phishing - CORRECT ANSWER✅✅✅the act of sending emails to specific and well-researched
targets while pretending to be a trusted sender



Dumpster Diving - CORRECT ANSWER✅✅✅exploration of a system's trash bin for the purpose of
finding details in order for a hacker to have a successful online assault.



Shoulder Surfing - CORRECT ANSWER✅✅✅When someone watches over your shoulder to nab
valuable information as you key it into an electronic device.



Pharming - CORRECT ANSWER✅✅✅cyberattack intended to redirect a website's traffic to another,
fake site.



Tailgating - CORRECT ANSWER✅✅✅Social engineering attempt by cyber threat actors in which they
trick employees into helping them gain unauthorized access into the company premises.

,Eliciting Information - CORRECT ANSWER✅✅✅Procedures or techniques involving interacting with
and communicating with others that is designed to gather knowledge or inform



Whaling - CORRECT ANSWER✅✅✅Spear phishing that focuses on one specific high level executive
or influencer



Prepending - CORRECT ANSWER✅✅✅Prepend is a word that means to attach content as a prefix.
For example, a prepend command could be used in a scripting language that a programmer would enter
into a certain function or code module. It would add certain characters of text to the beginning of some
variable or object.



Identity Fraud - CORRECT ANSWER✅✅✅identity fraud is the use of stolen information such as
making fake ID's and fake bank accounts



Invoice Scams - CORRECT ANSWER✅✅✅using fraudulent invoices to steal from a company



Credential Harvesting - CORRECT ANSWER✅✅✅the use of MITM attacks, DNS poisoning, phishing,
etc. to amass large numbers of credentials (username / password combinations) for reuse.



Reconnaissance - CORRECT ANSWER✅✅✅- Information gathering about a target network



Hoax - CORRECT ANSWER✅✅✅Cyber hoax scams are attacks that exploit unsuspecting users to
provide valuable information, such as login credentials or money.



Impersonation - CORRECT ANSWER✅✅✅typically involves an email that seems to come from a
trusted source.



Watering hole attack - CORRECT ANSWER✅✅✅security exploit in which the attacker seeks to
compromise a specific group of end users by infecting websites that members of the group are known to
visit. The goal is to infect a targeted user's computer and gain access to the network at the target's place
of employment.

,Typo squatting - CORRECT ANSWER✅✅✅type of cybersquatting used by imposters that involve
registering domains with intentionally misspelled names of popular web addresses to install malware on
the user's system



Pretexting - CORRECT ANSWER✅✅✅the practice of presenting oneself as someone else in order to
obtain private information.



Influence campaigns - CORRECT ANSWER✅✅✅



Hybrid warfare - CORRECT ANSWER✅✅✅- Combining conventional warfare with cyberwarfare



Social Media Campaign - CORRECT ANSWER✅✅✅Planned, coordinated marketing efforts using one
or more social media platforms.



Principles: - CORRECT ANSWER✅✅✅Authority: an attacker may try to appear to have a certain level
authority.

Intimidation: may try to make the victim think that something terrible is going to happen if they don't
comply with the attacker's wishes.

Consensus: An attacker may try to sway the mind of a victim using names they are familiar with, saying
that such ones provided them information (they are fishing for) in the past and you should be able to do
the same.

Scarcity: An attacker may try to set a time limit on a victim so that they can comply with their wishes by
a certain deadline.

Familiarity: they make you familiar with them on the phone and make you want to do things for them.

Trust: The attacker in this case can claim to be a friend or close associate of someone you may know
very well and that's trusted.

Urgency: When attackers want you to act and not think, they want you to do what they want as quickly
as possible so that there's no time to spot all the red flags.



Malware - CORRECT ANSWER✅✅✅a program or file designed to be disruptive, invasive and harmful
to your computer.

, Ransomware - CORRECT ANSWER✅✅✅Software that encrypts programs and data until a ransom is
paid to remove it.



Worms - CORRECT ANSWER✅✅✅Independent computer programs that copy themselves from one
computer to other computers over a network



potentially unwanted program (PUP) - CORRECT ANSWER✅✅✅program that installs itself on a
computer, typically without the user's informed consent



Fileless virus - CORRECT ANSWER✅✅✅Software that uses legitimate programs to infect a computer.
It does not rely on files and leaves no footprint, making it challenging to detect and remove.



command and control - CORRECT ANSWER✅✅✅A computer controlled by an attacker or
cybercriminal which is used to send commands to systems compromised by malware and receive stolen
data from a target network



Bots - CORRECT ANSWER✅✅✅self-propagating malware that infects its host and connects back to a
central server(s).



Cryptomalware - CORRECT ANSWER✅✅✅Malware to remain in place for as long as possible, quietly
mining in the background.



logic bomb - CORRECT ANSWER✅✅✅A computer program or part of a program that lies dormant
until it is triggered by a specific logical event.



Spyware - CORRECT ANSWER✅✅✅Type of malware that infects your PC or mobile device and
gathers information about you, including the sites you visit, the things you download, your usernames
and passwords, payment information, and the emails you send and receive.



Keyloggers - CORRECT ANSWER✅✅✅software that tracks or logs the keys struck on your keyboard,
typically in a covert manner so that you don't know that your actions are being monitored.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
STANGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
51
Member since
1 year
Number of followers
1
Documents
10202
Last sold
6 days ago
STAN-GRADES

EXCELLENCY IN ACADEMIC MATERIALS

3.4

11 reviews

5
4
4
1
3
3
2
1
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions