CompTIA Section 1.2

Descripción

Vocabulary words to remember
M M
Fichas por M M, actualizado hace más de 1 año
M M
Creado por M M hace alrededor de 3 años
3
0

Resumen del Recurso

Pregunta Respuesta
Malware A malicious software designed to damage and destroy computers and computer systems
Viruses Malware that can reproduce itself. It needs an end user to start the replication process
Worm A malware that self-replicates and doesn't need human intervention to spread, unlike a virus.
Ransomware Locks an organization out of it's own data and computer, demanding payment in order to restore services. The goal is to prevent the victim from accessing systems or files in exchange for electronic payment
Trojan Malicious code or software that pretends to be something it's not, so it can infect your computer. They are design to damage, disrupt, steal, or inflict some other harmful action on your data or network
Backdoor An undocumented way of gaining access to a computer. A backdoor is a potential security risk
Root-kit ​​​​​​​A set of tools used by an attacker after gaining root-level access to a host to conceal the attackers' activities on the host and permit the attacker to maintain root-level access to the host through covert means
Adware A software that displays unwanted advertising on your computer device. Though they are not necessarily malicious, they can redirect you to malicious sites.
Spyware Malware that spies on you. They are covertly installed on a system or device and monitors the victims activities and gain personal information without their knowledge
Bots "Bot" is short for Robot. A bot is a single piece of automated software that performs predefined assignments on command, usually over the network
Botnet A collective of bots working together and controlled by a single operator
Logic Bomb A piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met
Hashing the password One-way transformation on a password, turning the password into another String, called the hash password.
Password Spraying Attack A type of brute force attack, where attackers will use one password against many different accounts. This prevents accounts from being locked out, instead of brute forcing a single account with many passwords
Brute Force Attack A hacking method that tries every possible password/passphrase combination with the hopes of getting a match.
Dictionary Attack Use common words taken from a dictionary in hopes they will be the passwords they are looking for
Rainbow Tables A database that’s an optimized, pre-built set of hashes that were created earlier
Salt A random string of data used to modify a password hash.
Mostrar resumen completo Ocultar resumen completo

Similar

Security + Practice
Elise Berg
CH3: OSI Layers, Devices, and Protocols
Brent Jerdo
CH3: Well-Known Ports
Brent Jerdo
Comptia A+ Terms
Benjamin Centeio
CompTIA Security+
michael smith0754
SY0-401 Part 1 (50 questions)
desideri
CASP PreTest #2
michael smith0754
Ch 3 - Basic Cryptography
C Danvers
CompTIA Network+ Common Ports
Justin McFall
CompTIA Network+ Acronyms
Justin McFall