ALL CompTIA Security+ (SY0-701) Exam Objectives Master Set

0.0(0)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/725

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

726 Terms

1
New cards

Public key infrastructure (PKI)

A system that manages the creation, distribution, and revocation of digital certificates.

2
New cards

Public key

A cryptographic key that is used for encryption and verifying digital signatures in asymmetric encryption.

3
New cards

Private key

A cryptographic key that is used for decryption and creating digital signatures in asymmetric encryption.

4
New cards

Key escrow

A process where a trusted third party holds a copy of an encryption key.

5
New cards

Encryption

The process of converting plaintext into ciphertext to protect data confidentiality.

6
New cards

Full-disk encryption

The process of encrypting the entire disk to protect all data stored on it.

7
New cards

Partition encryption

The process of encrypting a specific partition on a disk.

8
New cards

File encryption

The process of encrypting individual files to protect their contents.

9
New cards

Volume encryption

The process of encrypting a logical volume, which can span multiple disks or partitions.

10
New cards

Database encryption

The process of encrypting a database to protect its contents.

11
New cards

Record encryption

The process of encrypting individual records within a database.

12
New cards

Transport/communication encryption

The process of encrypting data during transmission to ensure its confidentiality.

13
New cards

Asymmetric encryption

A cryptographic system that uses two different keys: a public key for encryption and a private key for decryption.

14
New cards

Symmetric encryption

A cryptographic system that uses the same key for both encryption and decryption.

15
New cards

Key exchange

The process of securely sharing encryption keys between parties.

16
New cards

Algorithms

Mathematical functions used in encryption and decryption processes.

17
New cards

Key length

The size of the encryption key, measured in bits.

18
New cards

Trusted Platform Module (TPM)

A hardware component that provides secure storage and cryptographic functions.

19
New cards

Hardware security module (HSM)

A physical device that generates, stores, and manages cryptographic keys.

20
New cards

Key management system

A system that handles the generation, storage, and distribution of cryptographic keys.

21
New cards

Secure enclave

A secure area within a processor that protects sensitive data.

22
New cards

Obfuscation

The process of making something unclear or difficult to understand.

23
New cards

Steganography

The process of hiding secret information within an innocent-looking carrier file.

24
New cards

Tokenization

The process of replacing sensitive data with a non-sensitive token.

25
New cards

Data masking

The process of modifying sensitive data to protect its confidentiality.

26
New cards

Hashing

The process of converting data into a fixed-size string of characters.

27
New cards

Salting

The process of adding random data to the input of a hash function to prevent precomputed attacks.

28
New cards

Digital signatures

A cryptographic mechanism to verify the authenticity and integrity of digital documents.

29
New cards

Key stretching

A technique to make a cryptographic key more resistant to brute-force attacks.

30
New cards

Blockchain

A distributed ledger that records transactions across multiple computers.

31
New cards

Open public ledger

A transparent and publicly accessible record of all transactions in a blockchain.

32
New cards

Certificates

Digital documents that bind a public key to an entity.

33
New cards

Certificate authorities

Entities that issue and sign digital certificates.

34
New cards

Certificate revocation lists (CRLs)

Lists of revoked digital certificates.

35
New cards

Online Certificate Status Protocol (OCSP)

A protocol for checking the revocation status of digital certificates.

36
New cards

Self-signed

A digital certificate that is signed by its own private key.

37
New cards

Third-party Certificate

A digital certificate that is signed by a trusted third-party certificate authority.

38
New cards

Root of trust

A trusted entity or component that forms the basis of a security system.

39
New cards

Certificate signing request (CSR) generation

The process of creating a request for a digital certificate.

40
New cards

Wildcard

A type of digital certificate that can be used for multiple subdomains.

41
New cards

Confidentiality

The principle of protecting data from unauthorized access.

42
New cards

Integrity

The principle of ensuring accuracy and completeness of data.

43
New cards

Availability

The principle of ensuring data is accessible when needed.

44
New cards

Non-repudiation

The ability to prove that a specific action or event occurred and that it was performed by a specific entity.

45
New cards

Authentication

The process of verifying the identity of individuals or systems.

46
New cards

Authorization

The process of granting or denying access rights based on authenticated identity.

47
New cards

Accounting

The process of tracking and recording activities for auditing purposes.

48
New cards

Gap analysis

The assessment of the difference between the current and desired state of security measures.

49
New cards

Zero Trust

A security model that requires continuous verification and authentication for all users and devices, assuming no trust by default.

50
New cards

Control Plane

The network component that manages access to resources and enforces security policies.

51
New cards

Adaptive identity

A control plane component that dynamically adjusts access privileges based on user behavior and context.

52
New cards

Threat scope reduction

A control plane technique that limits the exposure of resources to potential threats.

53
New cards

Policy-driven access control

A control plane approach that enforces access rules based on predefined policies.

54
New cards

Policy Administrator

A control plane component responsible for managing and defining security policies.

55
New cards

Policy Engine

A control plane component that evaluates and enforces security policies.

56
New cards

Data Plane

The network component that handles data traffic

57
New cards

Implicit trust zones

Data plane areas where trust is assumed, allowing communication without additional authentication.

58
New cards

Subject/System

Entities within the data plane that interact with each other.

59
New cards

Policy Enforcement Point

A data plane component that enforces security policies and controls access to resources.

60
New cards

Physical security

Measures taken to protect physical assets and prevent unauthorized access.

61
New cards

Bollards

Physical barriers used to control or block vehicle access.

62
New cards

Access control vestibule

A small enclosed area designed to control access to a building or secure area.

63
New cards

Fencing

Physical barriers used to enclose and protect an area.

64
New cards

Video surveillance

The use of cameras to monitor and record activities in a specific area.

65
New cards

Security guard

A person responsible for monitoring and protecting a specific area or property.

66
New cards

Access badge

A physical or electronic card used to grant access to a secure area.

67
New cards

Lighting

Illumination used to enhance visibility and deter unauthorized access.

68
New cards

Sensors

Devices used to detect and respond to specific environmental conditions.

69
New cards

Infrared

A type of sensor that detects heat radiation.

70
New cards

Pressure

A type of sensor that detects changes in pressure.

71
New cards

Microwave

A type of sensor that uses microwave radiation to detect movement.

72
New cards

Ultrasonic

A type of sensor that uses sound waves to detect objects or movement.

73
New cards

Deception and disruption technology

Techniques and tools used to mislead or disrupt attackers.

74
New cards

Honeypot

A decoy system designed to attract and monitor unauthorized access attempts.

75
New cards

Honeynet

A network of honeypots used to gather information about attackers.

76
New cards

Honeyfile

A file that appears valuable to attackers but is actually monitored.

77
New cards

Honeytoken

A piece of information that appears valid but is actually a trap for attackers.

78
New cards

Technical Control

A control category that utilizes technology or tools to prevent or detect risks in a system or process.

79
New cards

Managerial Control

A control category that involves the implementation of policies and procedures to manage risks within an organization.

80
New cards

Operational Control

A control category that focuses on the day-to-day activities and processes to mitigate risks and ensure smooth operations.

81
New cards

Physical Control

A control category that utilizes physical barriers or safeguards to protect assets and prevent unauthorized access.

82
New cards

Preventive Control

A control type that aims to proactively stop risks from occurring by implementing measures and safeguards.

83
New cards

Deterrent Control

A control type that discourages individuals from engaging in risky behavior through the presence of deterrent measures.

84
New cards

Detective Control

A control type that identifies risks or incidents after they have occurred, allowing for timely response and mitigation.

85
New cards

Corrective Control

A control type that addresses risks or incidents and takes appropriate actions to rectify them and prevent recurrence.

86
New cards

Compensating Control

A control type that provides an alternative measure to mitigate risks when primary controls are not effective or feasible.

87
New cards

Directive Control

A control type that provides guidance or instructions to individuals to ensure compliance with organizational policies or procedures.

88
New cards

Business processes impacting security operation

Processes that affect security operations, including approval, ownership, stakeholders, impact analysis, test results, backout plan, maintenance window, and standard operating procedure.

89
New cards

Approval process

Process for obtaining approval for security-related activities.

90
New cards

Ownership

Responsibility and accountability for security-related activities.

91
New cards

Stakeholders

Individuals or groups with an interest or involvement in security operations.

92
New cards

Impact analysis

Assessment of the potential effects of security-related activities on the system or organization.

93
New cards

Test results

Outcomes of security testing to evaluate the effectiveness of security measures.

94
New cards

Backout plan

Plan to revert security-related changes in case of issues or failures.

95
New cards

Maintenance window

Scheduled period of time during which security maintenance activities can be performed without impacting normal operations.

96
New cards

Standard operating procedure

Documented set of step-by-step instructions for performing security-related tasks.

97
New cards

Technical implications

Technical considerations and consequences of security operations, including allow lists/deny lists, restricted activities, downtime, service restart, application restart, legacy applications, and dependencies.

98
New cards

Allow lists/deny lists

Lists of allowed or denied entities (e.g., IP addresses, users) for security purposes.

99
New cards

Restricted activities

Activities limited or controlled due to security requirements.

100
New cards

Downtime

Periods of time when a system or service is not available for use.