A Trojan appears to be something useful but includes a malicious component, such as installing a backdoor on a user’s system. Many Trojans are delivered via drive-by downloads. They can also infect systems from fake antivirus software, pirated software, games, or infected USB drives.
Click to view the back
Click to view the front
Intentionally left blank
Remember this – Trojan
PED
PED
Click to view the back
Click to view the front
Personal Electronic Device.
Small devices such as cell phones, radios, CD players, DVD players, video cameras, and MP3 players.
PED
change management
change management
Click to view the back
Click to view the front
The process used to prevent unauthorized changes. Unauthorized changes often result in unintended outages.
These Security+ flashcards provide you with a quick reminder of many of the different Security+ related concepts in a flashcard format. These concepts are explained in greater depth in the CompTIA Security+: Get Certified Get Ahead: SY0-501 Study Guide.