CompTIA Sec+ SY0-701 PBQ #1

Information Technology5 CardsCreated 8 months ago

This content outlines various cyberattacks including Botnets for DDoS, Remote Access Trojans (RATs) for unauthorized control, Worms targeting databases with default credentials, and Keyloggers for capturing keystrokes—along with the best practices to prevent or remediate each attack type.

Attack Description:

An attacker sends multiple SYN packets from multiple sources.

Intended target: Web Server

Attack Type:

Botnet

BEST Preventative or Remediation Action: Enable DDoS protection

Rate to track your progress ✦

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/5

Key Terms

Term
Definition

Attack Description:

An attacker sends multiple SYN packets from multiple sources.

Intended target: Web Server

Attack Type:

Botnet

BEST Preventative...

Attack Description:

The attack establishes a connection, which allows remote commands to be executed

Intended Target: User

Attack Type:

RAT (Remote Access Trojan)

Attack Description:

The attack is self-propagating and compromises a SQL database using well-known credentials as it moves through the network.

Intended target: Database Server

Attack Type:

Worm

BEST Preventative o...

Attack Description:

The attack uses hardware to remotely monitor a user’s input activity to harvest credentials

Intended target: Executive

Attack Type:

Keylogger

BEST Preventat...

Attack Description:

The attack embeds hidden access in an internally developed application that bypasses account login

Intended target: Application

Attack Type:

Backdoor

BEST Preventati...

Related Flashcard Decks

TermDefinition

Attack Description:

An attacker sends multiple SYN packets from multiple sources.

Intended target: Web Server

Attack Type:

Botnet

BEST Preventative or Remediation Action: Enable DDoS protection

Attack Description:

The attack establishes a connection, which allows remote commands to be executed

Intended Target: User

Attack Type:

RAT (Remote Access Trojan)

BEST Preventative or Remediation Action: Disable remote access services

Attack Description:

The attack is self-propagating and compromises a SQL database using well-known credentials as it moves through the network.

Intended target: Database Server

Attack Type:

Worm

BEST Preventative or Remediation Action: Change the default application password

Attack Description:

The attack uses hardware to remotely monitor a user’s input activity to harvest credentials

Intended target: Executive

Attack Type:

Keylogger

BEST Preventative or Remediation Action: Implement 2FA using push notification

Attack Description:

The attack embeds hidden access in an internally developed application that bypasses account login

Intended target: Application

Attack Type:

Backdoor

BEST Preventative or Remediation Action: Conduct a code review