Flearn Website Header

ComptiaSecurity+ Threats Vulnerabilities Mitigations


Master ComptiaSecurity+ Threats Vulnerabilities Mitigations with our interactive study cards designed for effective learning. These flashcards use proven spaced repetition techniques to help you memorize key concepts, definitions, and facts. Perfect for students, professionals, and lifelong learners seeking to improve knowledge retention and ace exams through active recall practice.


Click any card to reveal the answer

What is malware?

click to flip

Answer:

Malicious software designed to damage disrupt or gain unauthorized access to systems

What is a virus?

click to flip

Answer:

Malware that attaches to files and requires user action to execute and spread

What is a worm?

click to flip

Answer:

Self-replicating malware that spreads automatically without user interaction

What is a Trojan?

click to flip

Answer:

Malware disguised as legitimate software that creates backdoors for attackers

What is ransomware?

click to flip

Answer:

Malware that encrypts files and demands payment for decryption

What is spyware?

click to flip

Answer:

Malware that secretly monitors and collects user information

What is a rootkit?

click to flip

Answer:

Malware that provides privileged access while hiding its presence

What is a logic bomb?

click to flip

Answer:

Malicious code that executes when specific conditions are met

📢
Advertisement
See Your Advert Here!

What is a backdoor?

click to flip

Answer:

Hidden method for bypassing normal authentication to access a system

What is a RAT?

click to flip

Answer:

Remote Access Trojan - allows attackers to control systems remotely

What is phishing?

click to flip

Answer:

Social engineering attack using fraudulent emails to steal credentials or information

What is spear phishing?

click to flip

Answer:

Targeted phishing attack directed at specific individuals or organizations

What is whaling?

click to flip

Answer:

Phishing attack specifically targeting high-level executives

What is vishing?

click to flip

Answer:

Voice phishing using phone calls to trick victims

What is smishing?

click to flip

Answer:

SMS/text message phishing attacks

What is pretexting?

click to flip

Answer:

Creating fabricated scenarios to manipulate victims into divulging information

📢
Advertisement
See Your Advert Here!

What is baiting?

click to flip

Answer:

Offering something enticing to lure victims into a trap

What is tailgating?

click to flip

Answer:

Following authorized personnel through secure doors without proper authentication

What is shoulder surfing?

click to flip

Answer:

Observing someone's screen or keyboard to steal information

What is dumpster diving?

click to flip

Answer:

Searching through trash to find sensitive information

What is a DDoS attack?

click to flip

Answer:

Distributed Denial of Service - overwhelming a system with traffic from multiple sources

What is a DoS attack?

click to flip

Answer:

Denial of Service - making a system unavailable to legitimate users

What is a SYN flood?

click to flip

Answer:

DoS attack exploiting TCP three-way handshake by sending multiple SYN requests

What is DNS poisoning?

click to flip

Answer:

Corrupting DNS cache to redirect users to malicious sites

📢
Advertisement
See Your Advert Here!

What is ARP spoofing?

click to flip

Answer:

Sending fake ARP messages to associate attacker's MAC with legitimate IP address

What is IP spoofing?

click to flip

Answer:

Forging source IP addresses to hide identity or impersonate another system

What is session hijacking?

click to flip

Answer:

Stealing or predicting session tokens to impersonate authenticated users

What is a man-in-the-middle attack?

click to flip

Answer:

Intercepting communication between two parties without their knowledge

What is SQL injection?

click to flip

Answer:

Inserting malicious SQL code into input fields to manipulate databases

What is cross-site scripting (XSS)?

click to flip

Answer:

Injecting malicious scripts into web pages viewed by other users

What is cross-site request forgery (CSRF)?

click to flip

Answer:

Forcing authenticated users to execute unwanted actions on web applications

What is buffer overflow?

click to flip

Answer:

Exploiting program by writing more data than buffer can hold

📢
Advertisement
See Your Advert Here!

What is privilege escalation?

click to flip

Answer:

Gaining higher access rights than originally authorized

What is a zero-day vulnerability?

click to flip

Answer:

Previously unknown vulnerability with no available patch or fix

What is a brute force attack?

click to flip

Answer:

Attempting all possible password combinations until finding the correct one

What is a dictionary attack?

click to flip

Answer:

Using list of common passwords and words to crack credentials

What is password spraying?

click to flip

Answer:

Trying common passwords against many accounts to avoid lockouts

What is credential stuffing?

click to flip

Answer:

Using stolen username/password pairs from one breach on other services

What is a replay attack?

click to flip

Answer:

Capturing and retransmitting valid data to gain unauthorized access

What is typosquatting?

click to flip

Answer:

Registering domains similar to legitimate sites to exploit typing errors

📢
Advertisement
See Your Advert Here!

What is watering hole attack?

click to flip

Answer:

Compromising websites frequently visited by target victims

What is insider threat?

click to flip

Answer:

Security risk from people within the organization with legitimate access

What is an APT?

click to flip

Answer:

Advanced Persistent Threat - sophisticated long-term targeted attack

What are the types of threat actors?

click to flip

Answer:

Nation-state organized crime hacktivists script kiddies insider threats

What is a script kiddie?

click to flip

Answer:

Inexperienced attacker using existing tools without deep technical knowledge

What is a hacktivist?

click to flip

Answer:

Attacker motivated by political or social causes

What is vulnerability scanning?

click to flip

Answer:

Automated process of identifying security weaknesses in systems

What is penetration testing?

click to flip

Answer:

Simulated attack to identify and exploit vulnerabilities in controlled manner

📢
Advertisement
See Your Advert Here!

What is patch management?

click to flip

Answer:

Process of acquiring testing and installing software updates to fix vulnerabilities

What is defense in depth?

click to flip

Answer:

Layered security approach using multiple controls to protect assets

What is least privilege principle?

click to flip

Answer:

Users should have minimum access rights needed to perform their jobs

Remember: Use all available resources to study. Flearn alone cannot guarantee success in any exams—make sure to supplement your learning!