Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Security+ Attack Types and Terms!! study guide with complete solutions

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
07-06-2022
Written in
2020/2021

Security+ Attack Types and Terms!! study guide with complete solutions Phishing : In This attack, the attacker sends an email that seems to come from a respected bank or other financial institution, claiming that the recipient needs to provide an account number, Social Security number, or other private information to the sender in order to verify an account Spear Phishing A phishing technique when attackers target a specific individual or institution 00:40 01:20 Whaling is a form of spear phishing that targets individuals or organizations that are known to possess a good deal of wealth Vishing is a human-based attack where the goal is to extract personal, financial, or confidential information from the victim by using services such as the telephone system and IP-based voice messaging services as the communication medium. This is also called voice phishing Tailgating This is a human-based attack where the attacker enters a secure area by following a legitimate employee without the employee's knowledge or permission Piggy Backing Similar to tailgating, this is a situation where the attacker enters a secure area with an employee's permission Impersonation is a human-based attack where an attacker pretends to be someone they are not. A common scenario is when the attacker calls an employee and pretends to be calling from the help desk. Dumpster Diving A human-based attack where the goal is to reclaim important information by inspecting the contents of trash containers Shoulder Surfing This is an attack where the goal is to look over the shoulder of an individual as he or she enters password information or a PIN Hoax is an email-based, IM-based, or web-based attack that is intended to trick the user into performing unnecessary or undesired actions, such as deleting important system files in an attempt to remove a virus. It could also be a scam to convince users to give up important information or money for an interesting offer Watering Hole Attack is when the attacker targets specific groups or organizations, discovers which websites they frequent, and injects malicious code into those sites DoS is a type of network attack in which an attacker attempts to disrupt or disable systems that provide network services by various means, including: • Flooding a network link with data to consume all available bandwidth. • Sending data designed to exploit known flaws in an application. • Sending multiple service requests to consume a system's resources. • Flooding a user's email inbox with spam messages, causing the genuine messages to get bounced back to the sender

Show more Read less
Institution
Course

Content preview

Security+ Attack Types and Terms!!
Phishing - Answer : In This attack, the attacker sends an email that seems to come from
a respected bank or other financial institution, claiming that the recipient needs to
provide an account number, Social Security number, or other private information to the
sender in order to verify an account

Spear Phishing - Answer A phishing technique when attackers target a specific
individual or institution

Whaling - Answer is a form of spear phishing that targets individuals or organizations
that are known to possess a good deal of wealth

Vishing - Answer is a human-based attack where the goal is to extract personal,
financial, or confidential
information from the victim by using services such as the telephone system and IP-
based voice
messaging services as the communication medium. This is also called voice phishing

Tailgating - Answer This is a human-based attack where the attacker enters a secure
area by following a legitimate employee without the employee's knowledge or
permission

Piggy Backing - Answer Similar to tailgating, this is a situation where the attacker enters
a secure area with an employee's permission

Impersonation - Answer is a human-based attack where an attacker pretends to be
someone they are not. A
common scenario is when the attacker calls an employee and pretends to be calling
from the help desk.

Dumpster Diving - Answer A human-based attack where the goal is to
reclaim important information by inspecting
the contents of trash containers

Shoulder Surfing - Answer This is an attack where the goal is to look over the shoulder
of an individual as he or she enters password information or a PIN

Hoax - Answer is an email-based, IM-based, or web-based attack that is intended to
trick the user into performing unnecessary or undesired actions, such as deleting
important system files in an attempt
to remove a virus. It could also be a scam to convince users to give up important
information or
money for an interesting offer

Watering Hole Attack - Answer is when the attacker targets specific groups or
organizations, discovers which websites they frequent, and injects malicious code into
those sites

, Security+ Attack Types and Terms!!
DoS - Answer is a type of network attack in which an attacker attempts to disrupt or
disable systems that provide network services by various means, including:
• Flooding a network link with data to consume all available bandwidth.
• Sending data designed to exploit known flaws in an application.
• Sending multiple service requests to consume a system's resources.
• Flooding a user's email inbox with spam messages, causing the genuine messages to
get bounced back to the sender

DDoS - Answer is a type of DoS attack that uses multiple
computers on disparate networks to launch the attack from many simultaneous sources.
The
attacker introduces unauthorized software that turns the computer into a zombie/drone
that directs the computers to launch the attack

Slashdot Effect - Answer is a sudden, temporary surge in traffic to a website that occurs
when another website or other source posts a story that refers visitors to the victim
website. This effect is more noticeable on smaller websites, and the increase in traffic
can slow a website's response times or make it impossible to reach altogether

MITM (Man-in-the-Middle) - Answer is a form of eavesdropping where the attacker
makes an independent connection between two victims (two clients or a client and a
server) and relays information between the two victims as if they are directly talking to
each other over a closed connection, when in reality the attacker is controlling the
information that travels between the two victims

Buffer Overflow - Answer An attack in which data goes past the boundary of the
destination buffer
and begins to corrupt adjacent memory. This causes an app to crash or reboot, and
may execute rogue code on a system or result in loss of data

Injection - Answer A broad field of attacks involving a hacker forcing additional input into
a program, which is then processed by a user

Cross-site scripting (XSS) Attack - Answer A web application attack that is directed
toward sites with dynamic content. This is done by introducing malicious scripts into a
trusted website. Since the website is trusted, the victim's browser grants the script the
same permissions as the rest of site, and its malicious code is able to
run. XSS attacks are similar to watering hole attacks

Cross-Site Forgery Request (CSFR) - Answer A web application attack that takes
advantage of the trust established between an authorized user of a website and the
website itself. This type of attack exploits a web browser's trust in a user's unexpired
browser cookies

Written for

Course

Document information

Uploaded on
June 7, 2022
Number of pages
7
Written in
2020/2021
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$9.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EvaTee Phoenix University
Follow You need to be logged in order to follow users or courses
Sold
5202
Member since
4 year
Number of followers
3567
Documents
55582
Last sold
6 hours ago
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.8

947 reviews

5
451
4
167
3
171
2
48
1
110

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions