CompTIA Sec+ SY0-701 PBQ #1
This content outlines various cyberattacks including Botnets for DDoS, Remote Access Trojans (RATs) for unauthorized control, Worms targeting databases with default credentials, and Keyloggers for capturing keystrokes—along with the best practices to prevent or remediate each attack type.
Attack Description:
An attacker sends multiple SYN packets from multiple sources.
Intended target: Web Server
Attack Type:
Botnet
BEST Preventative or Remediation Action: Enable DDoS protection
Key Terms
Attack Description:
An attacker sends multiple SYN packets from multiple sources.
Intended target: Web Server
Attack Type:
Botnet
BEST Preventative or Re...
Attack Description:
The attack establishes a connection, which allows remote commands to be executed
Intended Target: User
Attack Type:
RAT (Remote Access Trojan)
BES...
Attack Description:
The attack is self-propagating and compromises a SQL database using well-known credentials as it moves through the network.
Intended target: Database Server
Attack Type:
Worm
BEST Preventative or Reme...
Attack Description:
The attack uses hardware to remotely monitor a user’s input activity to harvest credentials
Intended target: Executive
Attack Type:
Keylogger
BEST Preventative or...
Attack Description:
The attack embeds hidden access in an internally developed application that bypasses account login
Intended target: Application
Attack Type:
Backdoor
BEST Preventative or ...
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
Term | Definition |
---|---|
Attack Description: An attacker sends multiple SYN packets from multiple sources. Intended target: Web Server | Attack Type: Botnet BEST Preventative or Remediation Action: Enable DDoS protection |
Attack Description: The attack establishes a connection, which allows remote commands to be executed Intended Target: User | Attack Type: RAT (Remote Access Trojan) BEST Preventative or Remediation Action: Disable remote access services |
Attack Description: The attack is self-propagating and compromises a SQL database using well-known credentials as it moves through the network. Intended target: Database Server | Attack Type: Worm BEST Preventative or Remediation Action: Change the default application password |
Attack Description: The attack uses hardware to remotely monitor a user’s input activity to harvest credentials Intended target: Executive | Attack Type: Keylogger BEST Preventative or Remediation Action: Implement 2FA using push notification |
Attack Description: The attack embeds hidden access in an internally developed application that bypasses account login Intended target: Application | Attack Type: Backdoor BEST Preventative or Remediation Action: Conduct a code review |