CompTIA Security+ (SY0-701) Exam Objectives Master Set

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 725

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

726 Terms

1

Public key infrastructure (PKI)

A system that manages the creation, distribution, and revocation of digital certificates.

New cards
2

Public key

A cryptographic key that is used for encryption and verifying digital signatures in asymmetric encryption.

New cards
3

Private key

A cryptographic key that is used for decryption and creating digital signatures in asymmetric encryption.

New cards
4

Key escrow

A process where a trusted third party holds a copy of an encryption key.

New cards
5

Encryption

The process of converting plaintext into ciphertext to protect data confidentiality.

New cards
6

Full-disk encryption

The process of encrypting the entire disk to protect all data stored on it.

New cards
7

Partition encryption

The process of encrypting a specific partition on a disk.

New cards
8

File encryption

The process of encrypting individual files to protect their contents.

New cards
9

Volume encryption

The process of encrypting a logical volume, which can span multiple disks or partitions.

New cards
10

Database encryption

The process of encrypting a database to protect its contents.

New cards
11

Record encryption

The process of encrypting individual records within a database.

New cards
12

Transport/communication encryption

The process of encrypting data during transmission to ensure its confidentiality.

New cards
13

Asymmetric encryption

A cryptographic system that uses two different keys: a public key for encryption and a private key for decryption.

New cards
14

Symmetric encryption

A cryptographic system that uses the same key for both encryption and decryption.

New cards
15

Key exchange

The process of securely sharing encryption keys between parties.

New cards
16

Algorithms

Mathematical functions used in encryption and decryption processes.

New cards
17

Key length

The size of the encryption key, measured in bits.

New cards
18

Trusted Platform Module (TPM)

A hardware component that provides secure storage and cryptographic functions.

New cards
19

Hardware security module (HSM)

A physical device that generates, stores, and manages cryptographic keys.

New cards
20

Key management system

A system that handles the generation, storage, and distribution of cryptographic keys.

New cards
21

Secure enclave

A secure area within a processor that protects sensitive data.

New cards
22

Obfuscation

The process of making something unclear or difficult to understand.

New cards
23

Steganography

The process of hiding secret information within an innocent-looking carrier file.

New cards
24

Tokenization

The process of replacing sensitive data with a non-sensitive token.

New cards
25

Data masking

The process of modifying sensitive data to protect its confidentiality.

New cards
26

Hashing

The process of converting data into a fixed-size string of characters.

New cards
27

Salting

The process of adding random data to the input of a hash function to prevent precomputed attacks.

New cards
28

Digital signatures

A cryptographic mechanism to verify the authenticity and integrity of digital documents.

New cards
29

Key stretching

A technique to make a cryptographic key more resistant to brute-force attacks.

New cards
30

Blockchain

A distributed ledger that records transactions across multiple computers.

New cards
31

Open public ledger

A transparent and publicly accessible record of all transactions in a blockchain.

New cards
32

Certificates

Digital documents that bind a public key to an entity.

New cards
33

Certificate authorities

Entities that issue and sign digital certificates.

New cards
34

Certificate revocation lists (CRLs)

Lists of revoked digital certificates.

New cards
35

Online Certificate Status Protocol (OCSP)

A protocol for checking the revocation status of digital certificates.

New cards
36

Self-signed

A digital certificate that is signed by its own private key.

New cards
37

Third-party Certificate

A digital certificate that is signed by a trusted third-party certificate authority.

New cards
38

Root of trust

A trusted entity or component that forms the basis of a security system.

New cards
39

Certificate signing request (CSR) generation

The process of creating a request for a digital certificate.

New cards
40

Wildcard

A type of digital certificate that can be used for multiple subdomains.

New cards
41

Confidentiality

The principle of protecting data from unauthorized access.

New cards
42

Integrity

The principle of ensuring accuracy and completeness of data.

New cards
43

Availability

The principle of ensuring data is accessible when needed.

New cards
44

Non-repudiation

The ability to prove that a specific action or event occurred and that it was performed by a specific entity.

New cards
45

Authentication

The process of verifying the identity of individuals or systems.

New cards
46

Authorization

The process of granting or denying access rights based on authenticated identity.

New cards
47

Accounting

The process of tracking and recording activities for auditing purposes.

New cards
48

Gap analysis

The assessment of the difference between the current and desired state of security measures.

New cards
49

Zero Trust

A security model that requires continuous verification and authentication for all users and devices, assuming no trust by default.

New cards
50

Control Plane

The network component that manages access to resources and enforces security policies.

New cards
51

Adaptive identity

A control plane component that dynamically adjusts access privileges based on user behavior and context.

New cards
52

Threat scope reduction

A control plane technique that limits the exposure of resources to potential threats.

New cards
53

Policy-driven access control

A control plane approach that enforces access rules based on predefined policies.

New cards
54

Policy Administrator

A control plane component responsible for managing and defining security policies.

New cards
55

Policy Engine

A control plane component that evaluates and enforces security policies.

New cards
56

Data Plane

The network component that handles data traffic

New cards
57

Implicit trust zones

Data plane areas where trust is assumed, allowing communication without additional authentication.

New cards
58

Subject/System

Entities within the data plane that interact with each other.

New cards
59

Policy Enforcement Point

A data plane component that enforces security policies and controls access to resources.

New cards
60

Physical security

Measures taken to protect physical assets and prevent unauthorized access.

New cards
61

Bollards

Physical barriers used to control or block vehicle access.

New cards
62

Access control vestibule

A small enclosed area designed to control access to a building or secure area.

New cards
63

Fencing

Physical barriers used to enclose and protect an area.

New cards
64

Video surveillance

The use of cameras to monitor and record activities in a specific area.

New cards
65

Security guard

A person responsible for monitoring and protecting a specific area or property.

New cards
66

Access badge

A physical or electronic card used to grant access to a secure area.

New cards
67

Lighting

Illumination used to enhance visibility and deter unauthorized access.

New cards
68

Sensors

Devices used to detect and respond to specific environmental conditions.

New cards
69

Infrared

A type of sensor that detects heat radiation.

New cards
70

Pressure

A type of sensor that detects changes in pressure.

New cards
71

Microwave

A type of sensor that uses microwave radiation to detect movement.

New cards
72

Ultrasonic

A type of sensor that uses sound waves to detect objects or movement.

New cards
73

Deception and disruption technology

Techniques and tools used to mislead or disrupt attackers.

New cards
74

Honeypot

A decoy system designed to attract and monitor unauthorized access attempts.

New cards
75

Honeynet

A network of honeypots used to gather information about attackers.

New cards
76

Honeyfile

A file that appears valuable to attackers but is actually monitored.

New cards
77

Honeytoken

A piece of information that appears valid but is actually a trap for attackers.

New cards
78

Technical Control

A control category that utilizes technology or tools to prevent or detect risks in a system or process.

New cards
79

Managerial Control

A control category that involves the implementation of policies and procedures to manage risks within an organization.

New cards
80

Operational Control

A control category that focuses on the day-to-day activities and processes to mitigate risks and ensure smooth operations.

New cards
81

Physical Control

A control category that utilizes physical barriers or safeguards to protect assets and prevent unauthorized access.

New cards
82

Preventive Control

A control type that aims to proactively stop risks from occurring by implementing measures and safeguards.

New cards
83

Deterrent Control

A control type that discourages individuals from engaging in risky behavior through the presence of deterrent measures.

New cards
84

Detective Control

A control type that identifies risks or incidents after they have occurred, allowing for timely response and mitigation.

New cards
85

Corrective Control

A control type that addresses risks or incidents and takes appropriate actions to rectify them and prevent recurrence.

New cards
86

Compensating Control

A control type that provides an alternative measure to mitigate risks when primary controls are not effective or feasible.

New cards
87

Directive Control

A control type that provides guidance or instructions to individuals to ensure compliance with organizational policies or procedures.

New cards
88

Business processes impacting security operation

Processes that affect security operations, including approval, ownership, stakeholders, impact analysis, test results, backout plan, maintenance window, and standard operating procedure.

New cards
89

Approval process

Process for obtaining approval for security-related activities.

New cards
90

Ownership

Responsibility and accountability for security-related activities.

New cards
91

Stakeholders

Individuals or groups with an interest or involvement in security operations.

New cards
92

Impact analysis

Assessment of the potential effects of security-related activities on the system or organization.

New cards
93

Test results

Outcomes of security testing to evaluate the effectiveness of security measures.

New cards
94

Backout plan

Plan to revert security-related changes in case of issues or failures.

New cards
95

Maintenance window

Scheduled period of time during which security maintenance activities can be performed without impacting normal operations.

New cards
96

Standard operating procedure

Documented set of step-by-step instructions for performing security-related tasks.

New cards
97

Technical implications

Technical considerations and consequences of security operations, including allow lists/deny lists, restricted activities, downtime, service restart, application restart, legacy applications, and dependencies.

New cards
98

Allow lists/deny lists

Lists of allowed or denied entities (e.g., IP addresses, users) for security purposes.

New cards
99

Restricted activities

Activities limited or controlled due to security requirements.

New cards
100

Downtime

Periods of time when a system or service is not available for use.

New cards

Explore top notes

note Note
studied byStudied by 1 person
86 days ago
5.0(1)
note Note
studied byStudied by 14 people
761 days ago
5.0(2)
note Note
studied byStudied by 66 people
511 days ago
5.0(1)
note Note
studied byStudied by 14 people
953 days ago
5.0(1)
note Note
studied byStudied by 5 people
926 days ago
4.0(1)
note Note
studied byStudied by 10 people
895 days ago
5.0(1)
note Note
studied byStudied by 11 people
972 days ago
4.5(2)
note Note
studied byStudied by 5237 people
150 days ago
4.4(9)

Explore top flashcards

flashcards Flashcard (28)
studied byStudied by 7 people
662 days ago
5.0(1)
flashcards Flashcard (96)
studied byStudied by 73 people
748 days ago
5.0(5)
flashcards Flashcard (43)
studied byStudied by 3 people
635 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 8 people
789 days ago
5.0(1)
flashcards Flashcard (170)
studied byStudied by 7 people
121 days ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 41 people
97 days ago
5.0(1)
flashcards Flashcard (1000)
studied byStudied by 29 people
852 days ago
4.0(1)
flashcards Flashcard (53)
studied byStudied by 3742 people
709 days ago
4.2(54)
robot