Chapter 3. Threats and Vulnerabilities
About 21 percent of the SY0-301 exam comes from this domain. This chapter focuses on the threat of vulnerabilities to which computers and networks are exposed. You will be expected to define different types of malware such as viruses, worms, Trojans, and rootkits. You will need to understand the threat that items such as logic bombs represent. Another key area of this chapter is the attacks that result in loss or damage. One of those is the man-in-the-middle attack. Hackers use these attacks to listen in on network communications. They can potentially even use them to take over connections by means of a session hijack. If all else fails, attackers can simply mount denial of service (DoS) attacks. While a ...
Get CompTIA® Security+™ Rapid Review (Exam SY0-301) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.