O'Reilly logo

CompTIA Security+™: Study Guide, Third Edition by Emmett Dulaney, Mike Pastore

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Identifying Potential Risks

THE FOLLOWING COMPTIA SECURITY+ EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER:

  • 1.4 Recognize the following attacks and specify the appropriate actions to take to mitigate vulnerability and risk

    • DoS/DDoS (Denial of Service/Distributed Denial of Service)

    • Back Door

    • Spoofing

    • Man in the Middle

    • Replay

    • TCP/IP Hijacking

    • Social Engineering

    • Password Guessing

      • Brute Force

      • Dictionary

    • Software Exploitation

  • 1.5 Recognize the following types of malicious code and specify the appropriate actions to take to mitigate vulnerability and risk

    • Viruses

    • Trojan Horses

    • Logic Bombs

    • Worms

  • 1.6 Understand the concept of and know how reduce the risks of social engineering

  • 1.7 Understand the concept and significance of auditing, logging, and system scanning ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required