CompTIA Security+ Exam Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/122

flashcard set

Earn XP

Description and Tags

Flashcards covering the key concepts from the CompTIA Security+ exam lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

123 Terms

1
New cards

What is Information Security?

The act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure and corruption, and destruction.

2
New cards

What is Information Systems Security?

The act of protecting the systems that hold and process the critical data.

3
New cards

What is a Threat?

Anything that could cause harm, loss, damage, or compromise to IT Systems.

4
New cards

What are some examples of external sources of threats?

Natural disasters, cyber-attacks, data integrity breaches, disclosure of confidential information.

5
New cards

What is a Vulnerability?

Any weakness in the system, design, or implementation.

6
New cards

What are some examples of internal sources of threats?

Software bugs, misconfigured software, improperly protected network devices, missing security patches, lack of physical security.

7
New cards

What is Risk Management?

Finding different ways to minimize the likelihood of an outcome occurring and achieve the desired outcomes.

8
New cards

What is Confidentiality?

Refers to the protection of information from unauthorized access and disclosure.

9
New cards

What are the main reasons for Confidentiality?

Protect personal privacy, maintain a business advantage, achieve regulatory compliance.

10
New cards

What elemental methods are used to maintain confidentiality?

Encryption, Access Controls, Data Masking, Physical Security Measures, Training and Awareness.

11
New cards

What is Data Masking?

Method that involves obscuring data within a database to make it inaccessible for unauthorized users while retaining the real data’s authenticity and user for authorized users.

12
New cards

What is Hashing?

Process of converting data into a fixed-size value.

13
New cards

What is Integrity?

Helps to ensure information and data remain accurate and unchanged from their original state unless intentionally modified by an authorized individual.

14
New cards

What are the goals of Integrity?

Ensure data accuracy, maintain trust, ensure system operability.

15
New cards

What methods are used to keep Integrity?

Hashing, Digital Signatures, Checksums, Access Controls, Regular Audits.

16
New cards

What are Digital Signatures?

Use encryption to ensure integrity and authenticity.

17
New cards

What are Checksums?

Method to verify the integrity of data during transmission.

18
New cards

What is Availability?

Used to ensure that information, systems, and resources are accessible and operational when needed by authorized user.

19
New cards

What are the goals of Availability?

Ensuring Business Continuity, Maintaining Customer Trust, Upholding an Organization’s Reputation.

20
New cards

What is Redundancy?

Duplication of critical components or functions of a system with the intention of enhancing its reliability.

21
New cards

What are the types of Redundancy?

Server redundancy, data redundancy, network redundancy, power redundancy

22
New cards

What is Non-repudiation?

Focused on providing undeniable proof in digital transactions.

23
New cards

What are the main reasons for Non-repudiation?

Confirming the Authenticity of Digital Transactions, Ensuring Integrity, Providing Accountability.

24
New cards

What is Authentication?

Security measure that ensures individuals or entities are who they claim to be during a communication or transaction.

25
New cards

What are the common user Authentication methods?

Something you know, Something you have, Something you are, Something you do, Somewhere you are.

26
New cards

What is Multi-factor Authentication?

The security process that requires users to provide multiple methods of identification to verify their identity

27
New cards

What is Authorization?

Permissions and privileges granted to users or entities after they have been authenticated.

28
New cards

What are Syslog servers?

Used to aggregate logs from various network devices and systems so that system administrators can analyze them to detect patterns or anomalies in the organization’s systems.

29
New cards

What is SIEM (Security Information & Event Management)?

Provides real-time analysis of security alerts generated by various hardware and software infrastructures in an organization.

30
New cards

What are Managerial Controls?

Involve the strategic planning and governance side of security.

31
New cards

What are Operational Controls?

Procedures and measures that are designed to protect data on a day-to-day basis and are mainly governed by internal processes and human actions.

32
New cards

What are Physical Controls?

Tangible, real-world measures taken to protect assets.

33
New cards

What are Preventive Controls?

Proactive measures implemented to toward potential security threats or breaches

34
New cards

What are Deterrent Controls?

Aim to discourage potential attackers by making the effort seem less appealing or more challenging.

35
New cards

What are Detective Controls?

Monitor and alert organizations to malicious activities as they occur or shortly thereafter.

36
New cards

What are Corrective Controls?

Mitigate any potential damage and restore the systems to their normal state.

37
New cards

What are Compensating Controls?

Alternative measures that are implemented when primary security controls are not feasible or effective.

38
New cards

What are Directive Controls?

Often rooted in policy or documentation and set the standards for behavior within an organization.

39
New cards

What is Policy Engine?

Cross-references the access request with its predefined policies.

40
New cards

What is Policy Administrator?

Used to establish and manage the access policies.

41
New cards

What is Policy Enforcement Point?

Allow or restrict access, and it will effectively act as a gatekeeper to the sensitive areas of the systems or networks.

42
New cards

What is Gap Analysis?

Process of evaluating the differences between an organization’s current performance and its desired performance.

43
New cards

What is Plan of Action and Milestones (POA&M)?

Outlines the specific measures to address each vulnerability, allocate resources, and set up timelines for each remediation task that is needed.

44
New cards

What is a Threat Actor?

An individual or entity responsible for incidents that impact security and data protection.

45
New cards

What are Honeypots?

Decoy systems or servers designed to attract and deceive potential attackers, simulating real-world IT assets to study their techniques.

46
New cards

What are Honeynets?

Creates an entire network of decoy systems to observe complex, multi-stage attacks.

47
New cards

What is Data Exfiltration?

The unauthorized transfer of data from a computer.

48
New cards

What is Espionage?

Involves spying on individuals, organizations, or nations to gather sensitive or classified information.

49
New cards

Who are Ethical Hackers?

Ethical hackers, also known as Authorized hackers, are motivated by a desire to improve security.

50
New cards

Who are Hactivists?

Individuals or groups that use their technical skills to promote a cause or drive social change instead of for personal gain.

51
New cards

What is a False Flag Attack?

Attack that is orchestrated in such a way that it appears to originate from a different source or group.

52
New cards

What are Insider Threats?

Cybersecurity threats that originate from within the organization.

53
New cards

What is Shadow IT?

The use of information technology systems, devices, software, applications, and services without explicit organizational approval.

54
New cards

What is a Threat Vector?

The means of pathway by which an attacker can gain unauthorized access to a computer or network to deliver a malicious payload or carry out an unwanted action.

55
New cards

What is an Attack Surface?

Encompasses all the various points where an unauthorized user can try to enter data to or extract data from an environment.

56
New cards

What are Tactics, Techniques, and Procedures (TTPs)?

Specific methods and patterns of activities or behaviors associated with a particular threat actor or group of threat actors.

57
New cards

What is a Fence?

Structure that encloses an area using interconnected panels or posts.

58
New cards

What are Bollards?

Robust, short vertical posts, made of steel or concrete, that are designed to manage or redirect vehicular traffic.

59
New cards

What is Brute Force?

Attack where access to a system is gained by trying all of the possibilities until breaking through.

60
New cards

What are Surveillance Systems?

Maintains the security and safety of facilities, including business, home, or commonly used public areas

61
New cards

What is Access Control Vestibule?

Double-door system that is designed with two doors that are electronically controlled to ensure that only one door can be opened at a given time.

62
New cards

What is Piggybacking?

Person with legitimate access intentionally allows another person without authorization to enter a secure area with them.

63
New cards

What is Tailgating?

Unauthorized person follows someone with legitimate access to the secure space without their knowledge or consent.

64
New cards

What is a Door Lock?

Physical security control that is designed to secure entryways by restricting and regulating access to a particular space or property.

65
New cards

What is False Acceptance Rate (FAR)?

The rate that the system authenticates a user as valid, even though that person should not have been granted access to the system.

66
New cards

What is False Rejection Rate (FRR)?

Occurs any time the biometrics system denies a user who should have been allowed access to the system.

67
New cards

What is Access Badge Cloning?

Refers to copying the data from an RFID or NFC card or badge onto another card or device.

68
New cards

What is Social Engineering?

Manipulative strategy that exploits human psychology to gain unauthorized access to systems, data, or physical spaces.

69
New cards

What is Phishing?

Fraudulent attack using deceptive emails from trusted sources to trick individuals into disclosing personal information like password and credit card numbers.

70
New cards

What is Business Email Compromise (BEC)?

Advanced phishing attack that leverages internal email accounts within a company to manipulate employees into carrying out malicious actions for the attacker.

71
New cards

What is a Scam?

Fraudulent or deceptive act or operation.

72
New cards

What is Fraud?

Wrongful or criminal deception intended to result in financial or personal gain.

73
New cards

What is Misinformation?

Inaccurate information shared unintentionally.

74
New cards

What is Disinformation?

Intentional spread of false information to deceive or mislead.

75
New cards

What is a Hoax?

Malicious deception that is often spread through social media, email, or other communication channels.

76
New cards

What is Shoulder Surfing?

Looking over someone’s shoulder to gather personal information.

77
New cards

What is Baiting?

Planting a malware-infected device for a victim to find and unintentionally introduce malware to their organization’s system.

78
New cards

What is Malware?

Any software that is designed to infiltrate a computer system without the user’s knowledge.

79
New cards

What are Virus?

Malicious software that attaches to clean files and spreads into a computer system.

80
New cards

What are Worms?

Standalone malware programs that replicate and spread to other systems by exploiting software vulnerabilities

81
New cards

What are Trojans?

Malicious programs which appear to be legitimate software that allow unauthorized access to a victim’s system when executed.

82
New cards

What is Ransomware?

Encrypts a user’s data and holds it hostage until a ransom is paid to the attacker for decryption.

83
New cards

What are Zombies?

Compromised computers that are remotely controlled by attackers and used in coordination to form a botnet.

84
New cards

What are Rootkits?

Malicious tools that hide their activities and operate at the OS level to allow for ongoing privileged access.

85
New cards

What are Keyloggers?

Record a user’s keystrokes and are used to capture passwords or other sensitive information.

86
New cards

What is Spyware?

Secretly monitors and gathers user information or activities and sends data to third parties.

87
New cards

What are the types of Viruses?

Boot Sector, Macro, Program, Multipartite, Encrypted, Polymorphic, Metamorphic, Stealth, Armor, Hoax

88
New cards

What is Exploit Technique?

Used to describe the specific method by which malware code infects a target host

89
New cards

What is Data Protection?

Process of safeguarding important information from corruption, compromise, or loss.

90
New cards

What is Data Classification?

Category based on the organization’s value and the sensitivity of the information if it were to be disclosed.

91
New cards

What is Data Sovereignty?

Information is subject to the laws and governance structures within the nation where it is collected.

92
New cards

Who is a Data Owner?

Senior executive role that has the responsibility for maintaining the confidentiality, integrity, and availability of the information asset.

93
New cards

Who is a Data Steward?

Is focused on the quality of the data and the associated metadata

94
New cards

What is Regulated Data?

Information controlled by laws, regulations, or industry standards

95
New cards

What is Intellectual property (IP)?

Creations of the mind, such as inventions, literary and artistic works, designs, and symbols.

96
New cards

What is Data Sovereignty?

Concept that digital information is subject to the laws of the country in which it is located.

97
New cards

What is Geofencing?

Involves setting up virtual boundaries to restrict data access based on geographic location.

98
New cards

What is Encryption?

Process of converting ordinary information (plaintext) into an unintelligible form (ciphertext).

99
New cards

What is Tokenization?

Replaces sensitive data with non-sensitive substitutes, known as tokens

100
New cards

What is Obfuscation?

Involves making data unclear or unintelligible, making it difficult for unauthorized users to understand.