DevNet Associate DEVASC 200-901 Official Certification Guide by Adrian Iliesiu (z-lib.org)

(andrew) #1
P
hi
sh
in
g

This type of exploit involves using emails or web pages
to procure sensitive information, such as usernames
and passwords.

M
al
w
ar
e

Malware is a piece of malicious code, such as spyware,
ransomware, a virus, or a worm. Malware is usually
trigged when someone clicks a link or an email
attachment, which then installs malicious software.

St
ru
ct
ur
ed
Q
ue
ry
La
ng
ua
ge
(S
Q
L)
in
je
cti
on

SQL injection is a code injection technique used to
modify or retrieve data from SQL databases. By
inserting specialized SQL statements into an entry field,
an attacker can execute commands that allow for the
retrieval of data from the database.

Br
ut
e-
fo
rc
e
at
ta
ck

Brute-force methods, which involve using trial and
error to decode data, can be used to crack passwords
and crack encryption keys. Other targets include API
keys, SSH logins, and Wi-Fi passwords.

CISCO UMBRELLA

Free download pdf