CompTIA Security+ SY0-701

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/125

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

126 Terms

1
New cards

Malware

A malicious software

2
New cards

Virus

malicious code that runs without user's knowledge. Viruses require a user action in order to reproduce and spread

3
New cards

Boot Sector Virus

A virus stored in the first sector of a hard drive and loaded into memory upon boot up. It is hard to detect

4
New cards

Macros Virus

Virus embedded in a document and executed when the document is opened .

5
New cards

Program Virus

virus that infect an executable or an application

6
New cards

Multipartite Virus

A virus that combines both boot sector and program viruses together by attaching itself to the boot sector and system files

7
New cards

Encrypted Virus

A virus that uses a cipher to encrypt the content itself to avoid detection by any antivirus software .

8
New cards

Polymorphic Virus

An advanced version of an encrypted virus that changes itself everytime its executed by trying to morph the way the code looks so the sign-based antivirus cant defect it

9
New cards

Metamorphic Virus

A virus that is able to rewrite itself entirely before it attempts to infect a file

10
New cards

Stealth Virus

a category of a virus protecting itself techniques viruses

11
New cards

Armored-

layer of protection to confuse a program or person analyzing it

12
New cards

Easter Egg

not a virus , trick user to infect themselves

13
New cards

Worms

A malware like a virus but it's able to replicate itself without user interaction that cause disruptions to network traffic, computer activities, and cause a system to crash or slow down

14
New cards

Trojans

A malware disguised as a piece of harmless software to preform desired and malicious functions to infect a system.

15
New cards

Remote Access Trojan (RAT)

A malware that allows an attacker to remotely control an infected computer

16
New cards

Ransomware

A malware that restricts access by encrypting a victims file or computer until ransom payment is recieved

17
New cards

Spyware

A malware that secretly gathers information about you without your consent by using a keylogger that captures keystrokes and take screenshots.

18
New cards

Adware

Displays advertisments based upon its spying

19
New cards

Grayware

mane a computer system to behave improperly

20
New cards

Rootkit

A software aimed to gain administrative level control on a system without detection. The attacker uses a technique called DLL Injection to maintain their persistent control

21
New cards

DLL Injection

A malicious code inserted into a running process on a Windows machine by taking advantage of Dynamic Link Libraries that are loaded at running time.

22
New cards

Driver manipulation

An attack that relies on compromising the Kernel-mode device drivers that operate at a private or system level. A shim is placed between two components to intercept calls and redirect them

23
New cards

What makes up a rootkit?

DDL Injection and Driver Manipulation

24
New cards

Spam

A malicious activity that abuses electronic messaging systems such as emails. Attackers often exploit a company's open mail relay to send their messages.

25
New cards

Threat Vector

A method to access a victims machine

26
New cards

Attack Vector- fix this

same as threat but in order to infect it w / malware

27
New cards

Water Holes - fix this

A malware placed on a website potential will access websites that are mispelled that you know your type squatting

28
New cards

Botnets

A collection of compromised computers under the control of a master node. It can be used for illegal activities or conclucting a DDoS attacks

29
New cards

Active Interception

Occurs when a computer is placed between the sender and the receiver to capture or modify the traffic between them

30
New cards

Backdoors

Used to bypass normal security and authentication functions

31
New cards

Logic Bomb

A malicious code that has been inserted inside a program and will execute only when certain conditions have been met.

32
New cards

Easter Egg-

non malicious code hidden message

33
New cards

Exploit Technique

A technique that describes the specific method by which malware code infects a target host .

34
New cards

Fileless Technique

A technique to avoid detection by signature-based security softwares by using a malware that is executed directly as a script or a small piece of shellcode

35
New cards

Dropper

Designed to install or run other types of malware embedded in a payload on an infected host

36
New cards

Downloader

A piece of code that connects to the internet to retrieve additional tools

37
New cards

Shellcode

A light weight code designed to run an exploit

38
New cards

Code Injection

Runs malicious code with the identification number of legit process such as Masquerading DLL Injection, DLL Sideloading , and Process hollowing

39
New cards

Living off the Land

An exploit technique that uses standard system to exploit packages to perform intrusions → Powershell

40
New cards

Software Firewalls

Software application that protects a single computer from unwanted internet traffic

41
New cards

Host-based Firewalls

Uses rules and policies to filter incoming and outgoing traffic on a single computer.

Windows = Basic and Advanced

OSX = PF and IPFW

Linux = iptables

42
New cards

Intrusion Detection System

A device or software that monitors a system or network and analyzes the data passing through it to identify an incident or attack. Only alert and log but doesnt protect it.

43
New cards

Host-based IDS

installed on a computer or server and logs suspicious activity

44
New cards

Network-based IDS

Hardware installed on a network switch, copies traffic, andlogs suspicious activity

45
New cards

Signature-based

Specific string of bytes triggers that an alert for known specific key.

46
New cards

Policy-based

Relies on a specific sequrity policy and flags any violations

47
New cards

Anomaly-based

Compares current traffic patterns with basline and alerts on deviations

48
New cards

True Positive

When a threat is detected and flagged

49
New cards

False Positive

When a normal activity is identified as an attack

50
New cards

True Negative

When a normal activity is not flagged

51
New cards

False Negative

When an actual threat is not flagged

52
New cards

HIDS

A detection system used to recreate the events after an attack has occurred.

53
New cards

Content Filters

Blocking of external files containing Javascript, images, or web pages from loading in a browser

54
New cards

Data Loss Prevention

A hardware or software designed to monitor the data of a system while in use, in transit, or at rest to detect attemps to steal the data.

55
New cards

Enpoint DLP Systems

Software-based client system that monitors data in use and stop a file transfer or alert an administrator of the occurance

56
New cards

Network DLP Systems

A software or hardware based solution installed on the perimeter of the network detect data in transit, going in or out with a focus on outgoing data .

57
New cards

Information Security

Act protects data and information from unauthorized access, unlawful modification and disruption, disclosure, corruption, and destruction.

58
New cards

Information Systems Security

Act of protecting the systems that hold processes that are critical data.

59
New cards

What are the three pillars of security?

Confidentiality, Integrity, and Availablity

60
New cards

Integrity

Information/data accuracy. Data cannot be modified by unauthorized users.

61
New cards

Availability

information/data being available when needed at all times.

62
New cards

Confidentiality

information/data privacy. Information is not made available to unauthorized users.

63
New cards

Non-repudiation

guarantees that a specific action or event has taken place and cannot be denied by the parties involved.

64
New cards

Authentication

verifying the identity of the person or device attempting to access the system

3 multiple choice options

65
New cards

Authorization

defines what actions or resources a user can access

3 multiple choice options

66
New cards

Accounting

Act of tracking user activities and resource usage

67
New cards

Security Controls

Measures or mechanisms put in place to mitigate risks and protect the confidentiality, integrity and availability of the system and its information

68
New cards

Zero Trust

A security model based on the principle of maintaining strict access controls and not trusting anyone by default, even those already inside the network.

69
New cards

Control Plane

Focused on the subject/system, policy engine, policy administrator, and establishing policy enforcement points

70
New cards

Vulnerbility

Weakness

71
New cards

Threat + No Vulnerability =

No Risk

72
New cards

No Threat + Vulnerability =

No Risk

73
New cards

Risk Management

using strategies to reduce the amount of risk (the degree of likelihood that a person will become ill upon exposure to a toxin or pathogen).

74
New cards

Encryption

Process of converting data into code to prevent unauthorized access.

75
New cards

Access Control

A security measure that defines who can access a computer, device, or network, when they can access it, and what actions they can take while accessing it.

76
New cards

Data Masking

Permitting parts of a sensitive value to be visible while leaving the remainder of the value shielded from view

77
New cards

Physical Security Measures

To ensure confidentiality for physical types of data and for digital information contained on servers and workstations.

- lock file cabinets, install biometric security locks on the server room door.

78
New cards

Training and Awareness

Conducting regular training on the security awareness best procestice that employees can use to protect the organization's sensitive data

79
New cards

Importance of Confidentiality

Protect personal privacy, Maintain a business advantage,

and Achieve regulatory compliance

80
New cards

5 Basic Methods to Ensure Confidentiality

Encryption, Access Controls, Data Masking, Physical Security Measures, and Training and Awareness

81
New cards

3 Main reasons why Integrity is crucial?

Data accuracy, Maintaining trust, an Ensuring system operability.

82
New cards

Data accuracy

ensures that decisions are made based on correct information and with the expected outcomes

83
New cards

Hashing

Process of converting data into a fixed-size value

84
New cards

Hash Digest

Digital Fingerprint

85
New cards

Digital Signature

Use encryption to ensure both integrity and authenticity. File is first hashed and then the resulting hash digest is encrypted using the user's private key.

86
New cards

Checksums

Used to verify data integrity during transmission. Sender and receiver compare checksum values to detect any unintended changes in the data.

87
New cards

Regular Audits

Involve reviewing logs and operations to ensure that only authorized changes have been made and any discrepancies are addressed.

88
New cards

5 Basic Methods to Maintain Data Integrity

Hashing, Digital Signatures, Checksums, Access Controls, and Regular Audits

89
New cards

5 Nines of Availability

System guarantees a downtime of no more than 5.26 minutes in a year.

90
New cards

Achieving the 5 Nines of Availability

Requires a robust infrastructure, proactive monitoring, redundancy measures, and swift disaster recovery mechanisms.

91
New cards

Redundancy

Duplicating critical components or functions of a system to enhance reliability and ensure uninterrupted service. Having backup options in place in case of system failure.

92
New cards

Server Redundancy

Using multiple servers in a load balance or failover configuration to support users when one server is overloaded or fails.

93
New cards

Data Redundancy

The duplication of data, or the storage of the same data in multiple places

94
New cards

Network Redundancy

Ensures that data can still travel through another route if one network path fails.

95
New cards

Power Redundancy

Involves using backup power sources, such as generators and uninterrupted power supply systems, to keep organizational systems operational during power disruptions or outages.

96
New cards

Non-repudiation

Digital Signatures

97
New cards

Availability

Redundancy

98
New cards

Integrity

Hashing

99
New cards

Confidentiality

Encryption

100
New cards

Knowledge Factor

something you know