IT CertificationsComprehensive Study Set

Comptia Sec+ 601 Exam Objectives

94 questions across 0 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Phishing

ANSWER

fraudulent attempt to obtain sensitive information or data, by disguising oneself as a trustworthy entity in an electronic communication.

QUESTION 2

Smishing

ANSWER

When someone tries to trick you into giving them your private information via a text or SMS message.

QUESTION 3

Vishing

ANSWER

Using social engineering over the telephone system to gain access to private personal and financial information for the purpose of financial reward

QUESTION 4

Spam

ANSWER

irrelevant or unsolicited messages sent to a large number of Internet users, for illegitimate advertising, and other activities such as phishing, and spreading malware

QUESTION 5

SPIM

ANSWER

Spam delivered through instant messaging (IM) instead of through e-mail messaging

QUESTION 6

Spear Phishing

ANSWER

the act of sending emails to specific and well-researched targets while pretending to be a trusted sender

QUESTION 7

Dumpster Diving

ANSWER

exploration of a system's trash bin for the purpose of finding details in order for a hacker to have a successful online assault.

QUESTION 8

Shoulder Surfing

ANSWER

When someone watches over your shoulder to nab valuable information as you key it into an electronic device.

QUESTION 9

Pharming

ANSWER

cyberattack intended to redirect a website's traffic to another, fake site.

QUESTION 10

Tailgating

ANSWER

Social engineering attempt by cyber threat actors in which they trick employees into helping them gain unauthorized access into the company premises.

QUESTION 11

Eliciting Information

ANSWER

Procedures or techniques involving interacting with and communicating with others that is designed to gather knowledge or inform

QUESTION 12

Whaling

ANSWER

Spear phishing that focuses on one specific high level executive or influencer

QUESTION 13

Prepending

ANSWER

Prepend is a word that means to attach content as a prefix. For example, a prepend command could be used in a scripting language that a programmer would enter into a certain function or code module. It would add certain characters of text to the beginning of some variable or object.

QUESTION 14

Identity Fraud

ANSWER

identity fraud is the use of stolen information such as making fake ID's and fake bank accounts

QUESTION 15

Invoice Scams

ANSWER

using fraudulent invoices to steal from a company

QUESTION 16

Credential Harvesting

ANSWER

the use of MITM attacks, DNS poisoning, phishing, etc. to amass large numbers of credentials (username / password combinations) for reuse.

QUESTION 17

Reconnaissance

ANSWER

- Information gathering about a target network

QUESTION 18

Hoax

ANSWER

Cyber hoax scams are attacks that exploit unsuspecting users to provide valuable information, such as login credentials or money.

QUESTION 19

Impersonation

ANSWER

typically involves an email that seems to come from a trusted source.

QUESTION 20

Watering hole attack

ANSWER

security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit. The goal is to infect a targeted user's computer and gain access to the network at the target's place of employment.

QUESTION 21

Typo squatting

ANSWER

type of cybersquatting used by imposters that involve registering domains with intentionally misspelled names of popular web addresses to install malware on the user's system

QUESTION 22

Pretexting

ANSWER

the practice of presenting oneself as someone else in order to obtain private information.

QUESTION 23

Influence campaigns

ANSWER

- Combining conventional warfare with cyberwarfare

QUESTION 24

Hybrid warfare

ANSWER

Planned, coordinated marketing efforts using one or more social media platforms.

QUESTION 25

Social Media Campaign

ANSWER

Authority: an attacker may try to appear to have a certain level authority. Intimidation: may try to make the victim think that something terrible is going to happen if they don't comply with the attacker's wishes. Consensus: An attacker may try to sway the mind of a victim using names they are familiar with, saying that such ones provided them information (they are fishing for) in the past and you should be able to do the same. Scarcity: An attacker may try to set a time limit on a victim so that they can comply with their wishes by a certain deadline. Familiarity: they make you familiar with them on the phone and make you want to do things for them. Trust: The attacker in this case can claim to be a friend or close associate of someone you may know very well and that's trusted. Urgency: When attackers want you to act and not think, they want you to do what they want as quickly as possible so that there's no time to spot all the red flags.

QUESTION 26

Principles:

ANSWER

a program or file designed to be disruptive, invasive and harmful to your computer.

QUESTION 27

Malware

ANSWER

Software that encrypts programs and data until a ransom is paid to remove it.

QUESTION 28

Ransomware

ANSWER

Independent computer programs that copy themselves from one computer to other computers over a network

QUESTION 29

Worms

ANSWER

program that installs itself on a computer, typically without the user's informed consent

QUESTION 30

potentially unwanted program (PUP)

ANSWER

Software that uses legitimate programs to infect a computer. It does not rely on files and leaves no footprint, making it challenging to detect and remove.

QUESTION 31

Fileless virus

ANSWER

A computer controlled by an attacker or cybercriminal which is used to send commands to systems compromised by malware and receive stolen data from a target network

QUESTION 32

command and control

ANSWER

self-propagating malware that infects its host and connects back to a central server(s).

QUESTION 33

Bots

ANSWER

Malware to remain in place for as long as possible, quietly mining in the background.

QUESTION 34

Cryptomalware

ANSWER

A computer program or part of a program that lies dormant until it is triggered by a specific logical event.

QUESTION 35

logic bomb

ANSWER

Type of malware that infects your PC or mobile device and gathers information about you, including the sites you visit, the things you download, your usernames and passwords, payment information, and the emails you send and receive.

QUESTION 36

Spyware

ANSWER

software that tracks or logs the keys struck on your keyboard, typically in a covert manner so that you don't know that your actions are being monitored.

QUESTION 37

Keyloggers

ANSWER

type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim's machine.

QUESTION 38

Remote Access Trojan

ANSWER

software program, typically malicious, that provides privileged, root-level (i.e., administrative) access to a computer while concealing its presence on that machine

QUESTION 39

Rootkit

ANSWER

refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application.

QUESTION 40

Backdoor

ANSWER

Any type of attack in which the attacker attempts to obtain and make use of passwords illegitimately.

QUESTION 41

Password Attack

ANSWER

An attack method that takes all the words from a dictionary file and attempts to log on by entering each dictionary entry as a password.

QUESTION 42

Spraying password attack

ANSWER

an attempt to guess a password by attempting every possible combination of characters and numbers in it

QUESTION 43

Dictionary password attack

ANSWER

an attack on a password that uses a large pregenerated data set of hashes from nearly every possible password

QUESTION 44

brute force password attack (offline and online)

ANSWER

1. Tainted training for machine learning (ML) 2. Security of machine learning algorithms

QUESTION 45

Rainbow Tables

ANSWER

1. Birthday: 2. Collision: 3. Downgrade:

QUESTION 46

Plaintext/unencrypted password attack

ANSWER

1. Server-side 2. Cross-site

QUESTION 47

Malicious universal serial bus (USB) cable

ANSWER

Some users with Bluetooth-enabled mobiles use this technology to send anonymous text messages to strangers.

QUESTION 48

Malicious flash drive

ANSWER

A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity.

QUESTION 49

Card cloning

ANSWER

A 24-bit value used in WEP that changes each time a packet is encrypted.

QUESTION 50

Skimming

ANSWER

A hierarchical system for naming resources on the Internet.

QUESTION 51

Adversarial artificial intelligence (AI)

ANSWER

Technique used by criminals to alter DNS records and drive users to fake sites, to committing phishing.

QUESTION 52

Supply-chain attacks

ANSWER

An attack that uses many computers to perform a DoS attack.

QUESTION 53

Cloud-based vs. on-premises attacks

ANSWER

programming language you can use to create macros

QUESTION 54

Cryptographic attacks

ANSWER

a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations such as governments

QUESTION 55

Privilege escalation

ANSWER

Current or former employee, contractor or other partner that has or had authorized access and intentionally misused that access

QUESTION 56

Cross-site scripting

ANSWER

A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage.

QUESTION 57

Injections

ANSWER

Individuals who want to break into computers to create damage, yet lack the advanced knowledge of computers and networks needed to do so.

QUESTION 58

Structured query language (SQL)

ANSWER

APTs, and nation states have a penchant for long-term attacks, which requires this which only major organizations or government can manage over time.

QUESTION 59

Dynamic link library

ANSWER

This can be simple or multifold in nature. A script kiddie is just trying to make a technique work. A more skilled threat actor is usually pursuing a specific objective, such as trying to make a point as a hacktivist. At the top of the intent pyramid is the APT threat actor, whose intent or motivation is at least threefold.

QUESTION 60

Lightweight directory access protocol (LDAP)

ANSWER

Information from media (newspapers, television), public government reports, professional and academic publications, and other openly available.

QUESTION 61

Extensible markup language (XML)

ANSWER

- unusual outbound traffic - anomalies in privileged account - geographic irregularities - login failures - swells in database read volume - large html responses - many requests for one file - mismatched port-applications - suspicious registry changes - spikes in dns requests from one host

QUESTION 62

Pointer/object dereference

ANSWER

system that enables the sharing of attack indicators between the US government and the private sector as soon as the treat is verified

QUESTION 63

Directory traversal

ANSWER

the use of data warehouses and complex algorithms to forecast future events, based on historical trends and calculated probabilities

QUESTION 64

Buffer overflows

ANSWER

A document published by the IETF that details information about standardized Internet protocols and those in various development stages.

QUESTION 65

Race conditions(Time of check/time of use)

ANSWER

1. System integration 2. Lack of vendor support

QUESTION 66

Error handling

ANSWER

Firmware: Operating system: Applications:

QUESTION 67

Improper input handling

ANSWER

Technology used to scan applications for potential vulnerabilities and weaknesses.

QUESTION 68

Replay attack (session replays)

ANSWER

The application of vulnerability scanning to network devices to search for vulnerabilities at the network level.

QUESTION 69

Integer overflow

ANSWER

Red-Team: Blue-Team: White-Team: Purple-Team:

QUESTION 70

Request forgeries

ANSWER

using a central control program separate from network devices to manage the flow of data on a network

QUESTION 71

Application programming interface (API) attacks

ANSWER

Commission/Decommission of assets from the time it is installed, until the time it is decommissioned and disposed.

QUESTION 72

Resource exhaustion

ANSWER

Techniques used while coding to provide as much security as possible.

QUESTION 73

Memory leak

ANSWER

An open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted.

QUESTION 74

Secure sockets layer (SSL) stripping

ANSWER

Using technology to automate IT processes.

QUESTION 75

Driver manipulation

ANSWER

Video cameras and receivers used for surveillance in areas that require security monitoring.

QUESTION 76

Shimming

ANSWER

Guards: Robot sentries: Reception: Two-person integrity/control

QUESTION 77

Refactoring

ANSWER

Biometrics: Electronic: Physical: Cable Locks:

QUESTION 78

Pass the hash

ANSWER

Burning: Shredding: Pulping: Pulverizing: Degaussing: Third-party solutions :

QUESTION 79

Wireless Evil Twin

ANSWER

An algorithm that uses elliptic curves instead of prime numbers to compute keys.

QUESTION 80

Rogue access point

ANSWER

Authenticated: Unauthenticated: Counter:

QUESTION 81

Bluesnarfing

ANSWER

Stream: Block:

QUESTION 82

Bluejacking

ANSWER

Audio: Video: Image:

QUESTION 83

Disassociation

ANSWER

Enables processing of encrypted data without the need to decrypt the data. It allows the cloud customer to upload data to a cloud service provider for processing without the requirement to decipher the data first.

QUESTION 84

Jamming

ANSWER

Modern malware tries to hide itself. Encrypted data hides the active malware code. Decryption occurs during execution.

QUESTION 85

Radio frequency identifier (RFID)

ANSWER

Password hashing. Protect the original password. Add salts to randomize the stored password hash.

QUESTION 86

Near Field Communication (NFC)

ANSWER

Confirm the authenticity of data. Digital signature provides both integrity and non-repudiation.

QUESTION 87

Initialization Vector (IV)

ANSWER

Manuel code review:

QUESTION 88

On-path attack(Man-in-the-middle)

ANSWER

Third-party updates: Auto-update:

QUESTION 89

Layer 2 attacks

ANSWER

Opal:

QUESTION 90

Address resolution protocol poisoning

ANSWER

Forward: Reverse:

QUESTION 91

Media access control flooding

ANSWER

Port taps:

QUESTION 92

MAC Cloning

ANSWER

Cost: Need for segmentation: Open systems Interconnection (OSI) Layers

QUESTION 93

Domain Name System (DNS)

ANSWER

Privacy enhanced mail (PEM)

QUESTION 94

Domain jacking

ANSWER

Online vs. offline CA:

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials