CompTIA Sec+ SY0-701 PBQ #1
An attacker sends multiple SYN packets from multiple sources. The attack establishes a connection, which allows remote commands to be executed.
Attack Description:
An attacker sends multiple SYN packets from multiple sources.
Intended target: Web Server
Attack Type: Botnet
BEST Preventative or Remediation Action: Enable DDoS protection
Key Terms
Attack Description:
An attacker sends multiple SYN packets from multiple sources.
Intended target: Web Server
Attack Type: Botnet
BEST Preventative or Remediation Action: Enable DDoS protection
Attack Description:
The attack establishes a connection, which allows remote commands to be executed
Intended Target: User
Attack Type: RAT (Remote Access Trojan)
BEST Preventative or Remediation Action: Disable remote access services
Attack Description:
The attack is self-propagating and compromises a SQL database using well-known credentials as it moves through the network.
Intended target: Database Server
Attack Type: Worm
BEST Preventative or Remediation Action: Change the default application password
Attack Description:
The attack uses hardware to remotely monitor a user’s input activity to harvest credentials
Intended target: Executive
Attack Type: Keylogger
BEST Preventative or Remediation Action: Implement 2FA using push notification
Attack Description:
The attack embeds hidden access in an internally developed application that bypasses account login
Intended target: Application
Attack Type: Backdoor
BEST Preventative or Remediation Action: Conduct a code review
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
Term | Definition |
---|---|
Attack Description: An attacker sends multiple SYN packets from multiple sources. Intended target: Web Server | Attack Type: Botnet |
Attack Description: The attack establishes a connection, which allows remote commands to be executed Intended Target: User | Attack Type: RAT (Remote Access Trojan) |
Attack Description: The attack is self-propagating and compromises a SQL database using well-known credentials as it moves through the network. Intended target: Database Server | Attack Type: Worm |
Attack Description: The attack uses hardware to remotely monitor a user’s input activity to harvest credentials Intended target: Executive | Attack Type: Keylogger |
Attack Description: The attack embeds hidden access in an internally developed application that bypasses account login Intended target: Application | Attack Type: Backdoor |