CompTIA Security+ SY0-701

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 125

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

126 Terms

1

Malware

A malicious software

New cards
2

Virus

malicious code that runs without user's knowledge. Viruses require a user action in order to reproduce and spread

New cards
3

Boot Sector Virus

A virus stored in the first sector of a hard drive and loaded into memory upon boot up. It is hard to detect

New cards
4

Macros Virus

Virus embedded in a document and executed when the document is opened .

New cards
5

Program Virus

virus that infect an executable or an application

New cards
6

Multipartite Virus

A virus that combines both boot sector and program viruses together by attaching itself to the boot sector and system files

New cards
7

Encrypted Virus

A virus that uses a cipher to encrypt the content itself to avoid detection by any antivirus software .

New cards
8

Polymorphic Virus

An advanced version of an encrypted virus that changes itself everytime its executed by trying to morph the way the code looks so the sign-based antivirus cant defect it

New cards
9

Metamorphic Virus

A virus that is able to rewrite itself entirely before it attempts to infect a file

New cards
10

Stealth Virus

a category of a virus protecting itself techniques viruses

New cards
11

Armored-

layer of protection to confuse a program or person analyzing it

New cards
12

Easter Egg

not a virus , trick user to infect themselves

New cards
13

Worms

A malware like a virus but it's able to replicate itself without user interaction that cause disruptions to network traffic, computer activities, and cause a system to crash or slow down

New cards
14

Trojans

A malware disguised as a piece of harmless software to preform desired and malicious functions to infect a system.

New cards
15

Remote Access Trojan (RAT)

A malware that allows an attacker to remotely control an infected computer

New cards
16

Ransomware

A malware that restricts access by encrypting a victims file or computer until ransom payment is recieved

New cards
17

Spyware

A malware that secretly gathers information about you without your consent by using a keylogger that captures keystrokes and take screenshots.

New cards
18

Adware

Displays advertisments based upon its spying

New cards
19

Grayware

mane a computer system to behave improperly

New cards
20

Rootkit

A software aimed to gain administrative level control on a system without detection. The attacker uses a technique called DLL Injection to maintain their persistent control

New cards
21

DLL Injection

A malicious code inserted into a running process on a Windows machine by taking advantage of Dynamic Link Libraries that are loaded at running time.

New cards
22

Driver manipulation

An attack that relies on compromising the Kernel-mode device drivers that operate at a private or system level. A shim is placed between two components to intercept calls and redirect them

New cards
23

What makes up a rootkit?

DDL Injection and Driver Manipulation

New cards
24

Spam

A malicious activity that abuses electronic messaging systems such as emails. Attackers often exploit a company's open mail relay to send their messages.

New cards
25

Threat Vector

A method to access a victims machine

New cards
26

Attack Vector- fix this

same as threat but in order to infect it w / malware

New cards
27

Water Holes - fix this

A malware placed on a website potential will access websites that are mispelled that you know your type squatting

New cards
28

Botnets

A collection of compromised computers under the control of a master node. It can be used for illegal activities or conclucting a DDoS attacks

New cards
29

Active Interception

Occurs when a computer is placed between the sender and the receiver to capture or modify the traffic between them

New cards
30

Backdoors

Used to bypass normal security and authentication functions

New cards
31

Logic Bomb

A malicious code that has been inserted inside a program and will execute only when certain conditions have been met.

New cards
32

Easter Egg-

non malicious code hidden message

New cards
33

Exploit Technique

A technique that describes the specific method by which malware code infects a target host .

New cards
34

Fileless Technique

A technique to avoid detection by signature-based security softwares by using a malware that is executed directly as a script or a small piece of shellcode

New cards
35

Dropper

Designed to install or run other types of malware embedded in a payload on an infected host

New cards
36

Downloader

A piece of code that connects to the internet to retrieve additional tools

New cards
37

Shellcode

A light weight code designed to run an exploit

New cards
38

Code Injection

Runs malicious code with the identification number of legit process such as Masquerading DLL Injection, DLL Sideloading , and Process hollowing

New cards
39

Living off the Land

An exploit technique that uses standard system to exploit packages to perform intrusions → Powershell

New cards
40

Software Firewalls

Software application that protects a single computer from unwanted internet traffic

New cards
41

Host-based Firewalls

Uses rules and policies to filter incoming and outgoing traffic on a single computer.

Windows = Basic and Advanced

OSX = PF and IPFW

Linux = iptables

New cards
42

Intrusion Detection System

A device or software that monitors a system or network and analyzes the data passing through it to identify an incident or attack. Only alert and log but doesnt protect it.

New cards
43

Host-based IDS

installed on a computer or server and logs suspicious activity

New cards
44

Network-based IDS

Hardware installed on a network switch, copies traffic, andlogs suspicious activity

New cards
45

Signature-based

Specific string of bytes triggers that an alert for known specific key.

New cards
46

Policy-based

Relies on a specific sequrity policy and flags any violations

New cards
47

Anomaly-based

Compares current traffic patterns with basline and alerts on deviations

New cards
48

True Positive

When a threat is detected and flagged

New cards
49

False Positive

When a normal activity is identified as an attack

New cards
50

True Negative

When a normal activity is not flagged

New cards
51

False Negative

When an actual threat is not flagged

New cards
52

HIDS

A detection system used to recreate the events after an attack has occurred.

New cards
53

Content Filters

Blocking of external files containing Javascript, images, or web pages from loading in a browser

New cards
54

Data Loss Prevention

A hardware or software designed to monitor the data of a system while in use, in transit, or at rest to detect attemps to steal the data.

New cards
55

Enpoint DLP Systems

Software-based client system that monitors data in use and stop a file transfer or alert an administrator of the occurance

New cards
56

Network DLP Systems

A software or hardware based solution installed on the perimeter of the network detect data in transit, going in or out with a focus on outgoing data .

New cards
57

Information Security

Act protects data and information from unauthorized access, unlawful modification and disruption, disclosure, corruption, and destruction.

New cards
58

Information Systems Security

Act of protecting the systems that hold processes that are critical data.

New cards
59

What are the three pillars of security?

Confidentiality, Integrity, and Availablity

New cards
60

Integrity

Information/data accuracy. Data cannot be modified by unauthorized users.

New cards
61

Availability

information/data being available when needed at all times.

New cards
62

Confidentiality

information/data privacy. Information is not made available to unauthorized users.

New cards
63

Non-repudiation

guarantees that a specific action or event has taken place and cannot be denied by the parties involved.

New cards
64

Authentication

verifying the identity of the person or device attempting to access the system

3 multiple choice options

New cards
65

Authorization

defines what actions or resources a user can access

3 multiple choice options

New cards
66

Accounting

Act of tracking user activities and resource usage

New cards
67

Security Controls

Measures or mechanisms put in place to mitigate risks and protect the confidentiality, integrity and availability of the system and its information

New cards
68

Zero Trust

A security model based on the principle of maintaining strict access controls and not trusting anyone by default, even those already inside the network.

New cards
69

Control Plane

Focused on the subject/system, policy engine, policy administrator, and establishing policy enforcement points

New cards
70

Vulnerbility

Weakness

New cards
71

Threat + No Vulnerability =

No Risk

New cards
72

No Threat + Vulnerability =

No Risk

New cards
73

Risk Management

using strategies to reduce the amount of risk (the degree of likelihood that a person will become ill upon exposure to a toxin or pathogen).

New cards
74

Encryption

Process of converting data into code to prevent unauthorized access.

New cards
75

Access Control

A security measure that defines who can access a computer, device, or network, when they can access it, and what actions they can take while accessing it.

New cards
76

Data Masking

Permitting parts of a sensitive value to be visible while leaving the remainder of the value shielded from view

New cards
77

Physical Security Measures

To ensure confidentiality for physical types of data and for digital information contained on servers and workstations.

- lock file cabinets, install biometric security locks on the server room door.

New cards
78

Training and Awareness

Conducting regular training on the security awareness best procestice that employees can use to protect the organization's sensitive data

New cards
79

Importance of Confidentiality

Protect personal privacy, Maintain a business advantage,

and Achieve regulatory compliance

New cards
80

5 Basic Methods to Ensure Confidentiality

Encryption, Access Controls, Data Masking, Physical Security Measures, and Training and Awareness

New cards
81

3 Main reasons why Integrity is crucial?

Data accuracy, Maintaining trust, an Ensuring system operability.

New cards
82

Data accuracy

ensures that decisions are made based on correct information and with the expected outcomes

New cards
83

Hashing

Process of converting data into a fixed-size value

New cards
84

Hash Digest

Digital Fingerprint

New cards
85

Digital Signature

Use encryption to ensure both integrity and authenticity. File is first hashed and then the resulting hash digest is encrypted using the user's private key.

New cards
86

Checksums

Used to verify data integrity during transmission. Sender and receiver compare checksum values to detect any unintended changes in the data.

New cards
87

Regular Audits

Involve reviewing logs and operations to ensure that only authorized changes have been made and any discrepancies are addressed.

New cards
88

5 Basic Methods to Maintain Data Integrity

Hashing, Digital Signatures, Checksums, Access Controls, and Regular Audits

New cards
89

5 Nines of Availability

System guarantees a downtime of no more than 5.26 minutes in a year.

New cards
90

Achieving the 5 Nines of Availability

Requires a robust infrastructure, proactive monitoring, redundancy measures, and swift disaster recovery mechanisms.

New cards
91

Redundancy

Duplicating critical components or functions of a system to enhance reliability and ensure uninterrupted service. Having backup options in place in case of system failure.

New cards
92

Server Redundancy

Using multiple servers in a load balance or failover configuration to support users when one server is overloaded or fails.

New cards
93

Data Redundancy

The duplication of data, or the storage of the same data in multiple places

New cards
94

Network Redundancy

Ensures that data can still travel through another route if one network path fails.

New cards
95

Power Redundancy

Involves using backup power sources, such as generators and uninterrupted power supply systems, to keep organizational systems operational during power disruptions or outages.

New cards
96

Non-repudiation

Digital Signatures

New cards
97

Availability

Redundancy

New cards
98

Integrity

Hashing

New cards
99

Confidentiality

Encryption

New cards
100

Knowledge Factor

something you know

New cards

Explore top notes

note Note
studied byStudied by 1 person
86 days ago
5.0(1)
note Note
studied byStudied by 14 people
761 days ago
5.0(2)
note Note
studied byStudied by 66 people
511 days ago
5.0(1)
note Note
studied byStudied by 14 people
953 days ago
5.0(1)
note Note
studied byStudied by 5 people
926 days ago
4.0(1)
note Note
studied byStudied by 10 people
895 days ago
5.0(1)
note Note
studied byStudied by 11 people
972 days ago
4.5(2)
note Note
studied byStudied by 5237 people
150 days ago
4.4(9)

Explore top flashcards

flashcards Flashcard (28)
studied byStudied by 7 people
662 days ago
5.0(1)
flashcards Flashcard (96)
studied byStudied by 73 people
748 days ago
5.0(5)
flashcards Flashcard (43)
studied byStudied by 3 people
635 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 8 people
789 days ago
5.0(1)
flashcards Flashcard (170)
studied byStudied by 7 people
121 days ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 41 people
97 days ago
5.0(1)
flashcards Flashcard (1000)
studied byStudied by 29 people
852 days ago
4.0(1)
flashcards Flashcard (53)
studied byStudied by 3742 people
709 days ago
4.2(54)
robot