In this chapter, we are going to look at attacks and vulnerabilities. Each type of attack will have its unique characteristics. This is probably the most heavily tested subject in the Security+ exam. This chapter needs to be thoroughly understood because, sometimes, questions about attacks are very vague, so if you do not understand the concepts fully, you may not understand what is being asked.
We will cover the following exam objectives in this chapter:
- Given a scenario, analyze indicators of compromise and determine the type of malware: Viruses—crypto-malware—Ransomware—worm—Trojan—rootkit—keylogger—adware—spyware—bots—RAT—logic bomb—backdoor
- Comparing and contrasting types of attacks: Social engineering—phishing—spear phishing&...