Security+ Final Study Set: Key Terms & Definitions

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/54

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

55 Terms

1
New cards

What is LWAPP?

Lightweight Access Point Protocol is what Cisco wireless controllers to communicate with access points.

2
New cards

What is an access point with enough processing logic to function and handle clients without a wireless controller?

Fat AP

3
New cards

What is an access point that requires a wireless controller?

Thin AP

4
New cards

Where does 802.11a work in?

Legacy products working in the 5 GHz band only.

5
New cards

What does coverage mean?

WLAN delivers acceptable data rates to supported devices in all physical locations expected.

6
New cards

What is the importance of disabling SSID?

Prevents any adapters not configured to the specified name from connecting to your network.

7
New cards

What is an issue with NFC?

No encryption, can be intercepted by eavesdropping or M in the M.

8
New cards

What are the 3 physical access controls?

Authentication, Authorization, Accounting

9
New cards

Security Zones: Public

Where guests are invited, deliveries accepted, and so on. Typically high traffic.

10
New cards

What are the 3 alarm systems?

Circuit, Motion Detection, Duress

11
New cards

What are the 3 primary clean agents?

FM-200, FE-13, INERGEN

12
New cards

What is DNS Spoofing?

An attack that compromises the name resolution process.

13
New cards

What does SSL/TLS work as?

Layer between application and transport layers of TCP/IP stack?

14
New cards

How is HTTPS implemented?

A server is assigned a digital cert signed by a trusted CA.

15
New cards

Port for TFTP?

69

16
New cards

What is Real-Time Transport (RTP)?

Stream of media via UDP with reliability features of TCP communication.

17
New cards

What is Point-To-Point Tunneling Protocol (PPTP)?

Provides encryption running on top of PPP. TCP/IP provides transport protocol.

18
New cards

Ports for PPTP?

UDP 1701, control link over 1723

19
New cards

What is L2TP used with?

Usually IPSec, encryption of PPP messages from the start, stronger than PPTP.

20
New cards

What is a Split Tunnel?

Client accesses internet directly using its "native" IP config and DNS servers.

21
New cards

What are the 2 modes for IPSec Transport Mode?

Authentication Header, Encapsulation Security Payload (ESP)

22
New cards

Port for RDP?

TCP 3389

23
New cards

What should the host be configured to never run?

No autorun on USB devices attached

24
New cards

What is a baseline?

A snapshot of typical activity on your network/host.

25
New cards

Difference of Whitelist/Blacklist?

Whitelist: Nothing can run if not on approved whitelist

Blacklist: Anything not on prohibited "blacklist" can run

26
New cards

What are the 3 Main Admin Windows Tools?

Control Panel, Management Consoles, Admin Tools

27
New cards

Describe BYOD

Most popular with employees but poses the most difficulties for security and network managers.

28
New cards

What is Virtual Desktop Infrastructure (VDI)?

Provisioning a workstation OS instance to interchangeable hardware.

29
New cards

What is USB OTG (On The Go)?

Port to function as host or device

30
New cards

What are the 3 components for a Virtual Platform?

Computers, Hyperviser, Guest OS (Virtual Machine)

31
New cards

Describe Cloud Deployment Models: Public

Hosted by 3rd party and shared with other subscribers

32
New cards

What is IaaS (Infrastructure as a Service)?

Provisioning IT resources such as servers, load balancers, and SANs quickly

33
New cards

What is PaaS (Platform as a Service)?

Resources somewhere between SaaS and IaaS. Multi-tier web app/database platform on top.

34
New cards

What is ESI (Electronically Stored Information)?

Latent, meaning evidence cannot be seen with the naked eye. Machine can read it.

35
New cards

Which technology act does the US follow?

Computer Fraud & Abuse Act 1996

36
New cards

What is the first phase of evidence?

Document the scene and collect evidence

37
New cards

What is counterintelligence in terms of cybersecurity?

Gathering info to protect against espionage and hacking

38
New cards

What is the Continuity of Operation Planning (COOP) or Business Continuity Planning (BCP)?

Design systems so they are as little affected by incidents as possible and resources are avail to recover.

39
New cards

What is succession planning?

Targets the specific issue of leadership and senior management.

40
New cards

What is a Tabletop Exercise?

Staff "ghost" disaster, without actually creating one. Doesn't provide evidence on what would actually happen.

41
New cards

What must a complex facility meet?

Must be reconstituted according to a carefully designed order of restoration.

42
New cards

What is a Backout Contingency Plan?

Rolling back OS updates in the event of an issue

43
New cards

3 bullets of non-persistence?

Snapshot/revert to known state, Rollback to known config, Live boot media

44
New cards

4 components of Business Impact Analysis (BIA)?

-Identify critical functions

-Identify assets

-Identify threats

-Access the risk

45
New cards

What is RTO (Recovery Time Objective)?

Period following a disaster that a system may remain offline.

46
New cards

What is MTTF (Mean Time to Failute)/ MTBF (Mean Time Between Failures)?

Represent the expected lifetime of a product or system.

47
New cards

What is MTTR (Mean Time to Repair)?

A measure of time taken to a correct a fault so that the system is restored to full operation.

48
New cards

What is XSRF (Cross-site Request Forgery)?

Exploit applications that use cookies to authenticate users and track sessions.

49
New cards

What is Clickjacking?

User sees and trusts a web app but it is intercepted by an attack who implements a malicious layer.

50
New cards

What is Fuzzing?

Testing an apps input validation routines work well.

51
New cards

What is client-side validation?

Restricted to informing the user that there is some sort of problem with the input before submitting it to the server.

52
New cards

For errors, what is best for an application?

Using custom error handlers so that the developer can choose the amount of info shown when an error is caused.

53
New cards

What is the aim of corporate security policy?`

To obtain support for security awareness in the organization and outline in general terms of risks, guidelines, and responsibilities.

54
New cards

What does hard drive sanitation refer to?

Completely erasing a harddrive.

55
New cards

What does NIST do?

Creates security trainings