Security+ 701

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/93

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

94 Terms

1
New cards

MAC

Mandatory Access Control: File and User level confidentiality

2
New cards

DAC

Discretionary Access Control: Principle of Least Privilege

3
New cards

ABAC

Attribute-Based Access Control

4
New cards

RBAC

Role-Based Access Control

5
New cards

SLE

Single loss expectancy. The monetary value of any single loss. SLE x ARO = ALE.

6
New cards

ARO

Annualized Rate of Occurence

7
New cards

ALE

Annualized Loss Expectancy

8
New cards

PUP

Potentially Unwanted Programs

9
New cards

WannaCry malware

2017, exploited EternalBlue Windows vulnerability.

10
New cards

APT

Advanced Persistent Threat

11
New cards

CybOX

Cyber Observable eXpression; XML Cyber Reports

12
New cards

STIX

(Structured Threat Information eXpression) A framework for analyzing cybersecurity incidents.

13
New cards

TAXII

(Trusted Automated eXchange of Indicator Information) A protocol for supplying codified information to automate incident detection and analysis.

14
New cards

Open Source Intelligence

Open-Source Intelligence (OSINT) is defined as intelligence produced by collecting, evaluating and analyzing publicly available information with the purpose of answering a specific intelligence question.

https://www.sans.org/blog/what-is-open-source-intelligence/

15
New cards

SIEM

Security information and event management

16
New cards

SOAR

Security Orchestration, Automation, Response

These platforms enhance SIEM capabilities

17
New cards

UCE

Unsolicited commercial email (spam)

18
New cards

CIA

Confidentiality, Integrity, Availability

19
New cards

SCAP

Security Content Automation Protocol. A set of security specifications for various applications and operating systems. Compliance tools such as vulnerability scanners use these to check systems for compliance.

20
New cards

CVSS

Common Vulnerability Scoring System, amount of risk.

21
New cards

CCE

Common Configuration Enumeration. Provides a standard nomenclature for discussing system configuration issues.

22
New cards

XCCDF

eXtensible Configuration Checklist Description Format

23
New cards

OVAL

Open Vulnerability Assessment Language. An international, information security, community standard to promote open and publicly available security content, and to standardize the transfer of this information across the entire spectrum of security tools and services. OVAL includes a language used to encode system details, and an assortment of content repositories held throughout the community.

24
New cards

AV

Attack Vector

25
New cards

AC

Attack Complexity

26
New cards

PR

Privilges Required

27
New cards

UI

User Interaction

28
New cards

PCI

Payment Card Industry Data Security Standard (PCI DSS) is a collection of policies and procedures developed by the Payment Card Industry to improve the security of credit, debit, and cash card transactions and protect cardholders from identity theft.

https://pcidssguide.com/pci-requirements-for-storing-credit-card-information/

29
New cards

CMMI

Capability maturity model Integration - A model developed by Software Engineering Institute to assist organizations in identifying what needs to be worked on next in software development to improve processes. Concepts are being applied elsewhere in business, from supply chain management to organizational processes.

30
New cards

OWASP

Open Web Application Security Project/Open Worldwide Application Security Project

31
New cards

SMishing

Phishing using SMS

32
New cards

Vishing

Phishing using voice phone calls. Contact initiated via email, user asked to call a given number and to give sensitive information, such as credit card numbers.

33
New cards

SPIM

Spam Over Instant Messaging. Unsolicited messages received via instant messaging systems.

34
New cards

Pharming

Misdirection of users to fake websites.

35
New cards

Prepending

During a social engineering attack providing information in advance of being asked, lending legitimacy to the attack.

36
New cards

RAT

Remote access Trojan. Malware that allows an attacker to take control of a system from a remote location.

37
New cards

Password Spraying

Attempting a couple common passwords on every possible account.

38
New cards

Rainbow Tables

pregenerated hashes

39
New cards

VM escape attack

40
New cards

SLE

Single Loss Expectancy

41
New cards

MD5

Message Digest 5. A hashing function used to provide integrity. MD5 uses 128 bits. A hash is simply a number created by applying the algorithm to a file or message at different times. The hashes are compared to each other to verify that integrity has been maintained.

42
New cards

RIPEMD

RIPE Message Digests - a family of cryptographic hash functions

43
New cards

EAP-TLS

Extensible Authentication Protocol-Transport Layer Security; Auth protocol for certs.

44
New cards

EAP-TTLS (Extensible Authentication Protocol-Tunneled Transport Layer Security)

A network authentication protocol that uses a TLS tunnel to protect the authentication process, allowing for various inner authentication methods like PAP or MSCHAPv2 within the secure tunnel.

45
New cards

Affinity Scheduling

A technique that prioritizes running specific tasks on computing nodes where they can execute more efficiently. Consider factors like CPU speed, memory access patterns, or task-specific requirements to minimize resource contention and maximize performance.

46
New cards

Transparent proxy

Intercepts and redirects network traffic without requiring any client-side configuration, acting as an "invisible" middleman between a user's device and the internet.

47
New cards

SLE

Single Loss Expectancy

48
New cards

ARO

Annual Rate of Occurence

49
New cards

ALE

Annualized Loss Expectancy

50
New cards

CVE

Common Vulnerabilities and Exposures

51
New cards

SLE

Single Loss Expectancy

52
New cards

SHA

Secure Hash Algorithm

53
New cards

MD5

Message Digest 5. A hashing function used to provide integrity. MD5 uses 128 bits. A hash is simply a number created by applying the algorithm to a file or message at different times. The hashes are compared to each other to verify that integrity has been maintained.

54
New cards

RIPEMD

RACE Integrity Primitives Evaluation Message Digest

55
New cards

SMTP

Simple Mail Transfer Protocol; port 25

56
New cards

ALE formula

ARO X SLE

57
New cards

Deauthentication attack

A common wireless attack used by hackers to disassociate wireless clients and make them attempt to reconnect to the access point

58
New cards

AAA

Authentication, Authorization, and Accounting

59
New cards

802.1X

The IEEE standard that defines port-based security for wireless network access control

60
New cards

Software firewall

A program that runs on a computer to allow or deny traffic between the computer and other computers to which it is connected

61
New cards

ECDH

Elliptic Curve Diffie-Hellman; key agreement

62
New cards

RSA Algorithm

Named after inventors Rivest, Shamir, and Adelman, RSA is a system for encrypting and decrypting a message using a pair of keys, both of which contain the product of two prime numbers.

63
New cards

AES

Advanced Encryption Standard

64
New cards

SHA-2

A family of Secure Hash Algorithms that has variations, known as SHA-224, SHA-256, SHA-384, and SHA-512.

65
New cards

Signature based NIDS

Your company implements two Network Intrusion Detection Systems (NIDS): one anomaly-based and one signature-based. It also implements two Network Intrusion Protection Systems (NIPS): one anomaly-based and one stateful protocol-based.

Your company employs an ethical hacker who uses ADMutate to disguise a buffer overflow attack. The attack is attempting to breach the network. Which system is most likely being targeted?

A)Signature-based NIDS

B)Stateful protocol-based NIPS

C)Anomaly-based NIPS

D)Anomaly-based NIDS

66
New cards

3DES

Triple Digital Encryption Standard. Originally designed as a replacement for DES. Uses multiple keys and multiple passes and is not as efficient as AES.

67
New cards

AH

Authentication Header

68
New cards

MD5

Message Digest 5; 128 bits

69
New cards

SHA1

Secure Hash Algorithm; 161 bits

70
New cards

SHA2

____ is the most secure hashing function now, with hashes as long as 512 bits.

71
New cards

ESP

Encapsulated Security Payload

72
New cards

AES

Advanced Encryption Standard

73
New cards

NLSP

Network Layer Security Protocol. Application of IPSec at Layer 3

74
New cards

SOAR

Security Orchestration, Automation, Response

75
New cards

SASE

Secure Access Service Edge

76
New cards

HSM

Hardware Security Module

77
New cards

SRTP

Secure Real-Time Protocol. Used to secure multi-media & VoIP communications.

78
New cards

CASE

Cloud Access Security Provider

79
New cards

MSSP

Managed Security Service Provider

80
New cards

COPE

Corporate Owned, Personally Enabled

81
New cards

SCP

Secure Copy Protocol

82
New cards

OPM

Office of Personnel Management

83
New cards

ISA

Interconnection Security Agreement

84
New cards

IOA

Indicator of Attack

85
New cards

AV

Asset Value

86
New cards

EF

Exposure Factor

87
New cards

RPO

Recovery Point Objective. Identifies a point in time where data loss is acceptable. It is related to the RTO and the BIA often includes both RTOs and RPOs.

88
New cards

BIA

Business Impact Analysis

89
New cards

PAN

Primary Account Number. Credit card acronym.

90
New cards

IGMP

Internet Group Management Protocol. Used for multicasting. Computers belonging to a multicasting group have a multicasting IP address in addition to a standard unicast IP address.

91
New cards

DER

Distinguised Encoding Rules, encoding a PKI certificate, representing ASN.1 data. Binary data. file formats: ,cer, .der

92
New cards

PEM

Privacy Enhanced Mail. Common format for PKI certificates. It can use either CER (ASCII) 0t DER (binary) formats. Marker - as a BEGIN CERTIFICATE line, and an END CERTIFICATE line. File format: .pem, .crt. .key

93
New cards

CCA

Chosen Ciphertext Attack

94
New cards

TTP

Tactics, Techniques and Procedures