comptia security+ 701 : the important terms

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/245

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:22 PM on 3/17/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

246 Terms

1
New cards

Preventive Controls

Prevent security incidents from occurring.

2
New cards

Deterrent Controls

Discourage potential attackers from attempting to compromise a system.

3
New cards

Detective Controls

Detect and alert on security incidents as they occur.

4
New cards

Corrective Controls

Correct and mitigate the impact of security incidents.

5
New cards

Compensating Controls

Security measures implemented to provide an alternative method of protecting assets when standard controls are not feasible.

6
New cards

Directive Controls

Specify acceptable practices and expected behavior.

7
New cards

CIANA

Confidentiality, Integrity, Non-Repudiation, Authentication

8
New cards

Gap Analysis

Strategic tool used to compare an organization’s capabilities with its desired potential, identifying the "gap" between the two

9
New cards

Honeypot

Decoy system or resource designed to attract and deceive attackers, appearing to be a legitimate part of the network. Monitored to gather information about the tactics, techniques, and motives an attacker may use.

10
New cards

Honeynet

A network of honeypots that interconnect to create a larger and more realistic environment for attracting and monitoring attackers.

11
New cards

Honeyfile

File or document intentionally created and placed in network to act as bait for attackers.

12
New cards

Honeytoken

Piece of data or credential that is intentionally placed within an information system to serve as a decoy or indicator of unauthorized access.

13
New cards

Non-Repudiation

Security principle ensuring that a party cannot deny the authenticity of their signature on a document or the sending of a message that they originated, usually achieved through the use of cryptographic methods, such as digital signatures and public key infrastructure.

14
New cards

PTZ

Pan Tilt Zoom

15
New cards

Five Factors Of Authentication

Something you know, something you have, something you are, something you do, somewhere you are.

16
New cards

FRR

False Rejection Rate.

17
New cards

Chiper Locker

Mechanical locking mechanism that uses a mechanical keypad for entry

18
New cards

Infrared Sensor

An electronic device that emits or detects infrared radiation to detect surroundings, such as motion, proximity, or temperature.

19
New cards

Microwave Sensor

An active electronic device that emits high-frequency electromagnetic pulses to catch motion or presence by measuring reflected signals based on the Doppler effect

20
New cards

Ultrasonic Sensor

Device that measures distance or detects objects by emitting high-frequency sound waves (ultrasound) beyond human hearing and measuring the time it takes for the echo to reflect back.

21
New cards

Shadow IT

A type of threat actor that creates internal threats involving the use of systems, devices, software, applications, and services that are used within an organization without explicit approval or knowledge of the organization’s IT department.

22
New cards

Social Proof

A psychological and social phenomenon where individuals copy the actions of others in an attempt to reflect correct behavior for a given situation. This concept is often exploited in social engineering attacks.

23
New cards

Typosquatting

A form of cyber-attack where malicious actors register domain names that are similar to legitimate websites, often differing by a small typo or misspelling.

24
New cards

Watering Hole Attack

A type of cyber-attack in which attacjers compromise a specific website or set of websites that are frequently visited by a particular group, organization, or industry. The goal is to infect the visitors of these sites with malware.

25
New cards

Phishing

A cyber-attack where attackers send fraudulent emails or messages pretending to be from reputable sources to trick individuals into revealing sensitive information, such as usernames, passwords, and credit card details.

26
New cards
27
New cards
28
New cards
29
New cards
30
New cards
31
New cards
32
New cards
33
New cards
34
New cards
35
New cards
36
New cards
37
New cards
38
New cards
39
New cards
40
New cards
41
New cards
42
New cards
43
New cards
44
New cards
45
New cards
46
New cards
47
New cards
48
New cards
49
New cards
50
New cards
51
New cards
52
New cards
53
New cards
54
New cards
55
New cards
56
New cards
57
New cards
58
New cards
59
New cards
60
New cards
61
New cards
62
New cards
63
New cards
64
New cards
65
New cards
66
New cards
67
New cards
68
New cards
69
New cards
70
New cards
71
New cards
72
New cards
73
New cards
74
New cards
75
New cards
76
New cards
77
New cards
78
New cards
79
New cards
80
New cards
81
New cards
82
New cards
83
New cards
84
New cards
85
New cards
86
New cards
87
New cards
88
New cards
89
New cards
90
New cards
91
New cards
92
New cards
93
New cards
94
New cards
95
New cards
96
New cards
97
New cards
98
New cards
99
New cards
100
New cards

Explore top flashcards

flashcards
Ch 8 - The Colonies Unite
40
Updated 1124d ago
0.0(0)
flashcards
Español Dos, Personas
22
Updated 858d ago
0.0(0)
flashcards
L1M3.2 Las invitaciones 1
97
Updated 1117d ago
0.0(0)
flashcards
Destination B2 Unit 4
149
Updated 266d ago
0.0(0)
flashcards
Road to the Crusades
46
Updated 432d ago
0.0(0)
flashcards
medieval europe: all cards
72
Updated 509d ago
0.0(0)
flashcards
Ch 8 - The Colonies Unite
40
Updated 1124d ago
0.0(0)
flashcards
Español Dos, Personas
22
Updated 858d ago
0.0(0)
flashcards
L1M3.2 Las invitaciones 1
97
Updated 1117d ago
0.0(0)
flashcards
Destination B2 Unit 4
149
Updated 266d ago
0.0(0)
flashcards
Road to the Crusades
46
Updated 432d ago
0.0(0)
flashcards
medieval europe: all cards
72
Updated 509d ago
0.0(0)