CompTIA Security+ (SY0-701) Master Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/322

flashcard set

Earn XP

Description and Tags

70 question-and-answer flashcards covering the principal concepts, definitions, processes, and best-practice facts found in the CompTIA Security+ (SY0-701) study notes. Use them to drill quickly on domains 1–5, including CIA/AAA, threat actors, zero trust, IAM, encryption, incident response, automation, and more.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

323 Terms

1
New cards

What are the three elements of the CIA triad?

Confidentiality, Integrity, and Availability.

2
New cards

Which two additional principles expand the CIA triad into the CIANA Pentagon?

Non-repudiation and Authentication.

3
New cards

What are the three "Triple-A" pillars of security?

Authentication, Authorization, and Accounting.

4
New cards

In CompTIA’s Security+ (SY0-701) exam, which domain has the highest weighting?

Domain 4 – Security Operations at 28 %.

5
New cards

What is Zero Trust’s fundamental assumption?

Never trust; always verify every device, user, and transaction.

6
New cards

Name the two planes that make up a Zero-Trust architecture.

Control Plane and Data Plane.

7
New cards

In Zero Trust, which component actually enforces an allow/deny decision?

Policy Enforcement Point (PEP) in the Data Plane.

8
New cards

Define a ‘threat’ in cybersecurity terms.

Anything that can exploit a vulnerability and cause harm to information systems.

9
New cards

Where does risk exist in relation to threats and vulnerabilities?

At the intersection where a threat matches a corresponding vulnerability.

10
New cards

List five common methods to protect confidentiality.

Encryption, Access Controls, Data Masking, Physical Security, Training/Awareness.

11
New cards

What security goal ensures undeniable proof of an action?

Non-repudiation.

12
New cards

Give the five typical authentication factors.

Something you know, have, are, do, and somewhere you are.

13
New cards

What is the difference between a vulnerability scan and a penetration test?

A scan passively identifies weaknesses; a pen test actively exploits them to prove impact.

14
New cards

Which document outlines specific remediation steps, resources, and timelines?

POA&M (Plan of Action and Milestones).

15
New cards

What are the four broad categories of security controls?

Technical, Managerial, Operational, and Physical.

16
New cards

Name at least four security control TYPES.

Preventive, Deterrent, Detective, Corrective, Compensating, Directive.

17
New cards

Which risk management strategy transfers risk to another party?

Risk Transference (e.g., through insurance or contractual clauses).

18
New cards

Define ‘script kiddie’.

An unskilled attacker who uses pre-made tools or scripts created by others.

19
New cards

Which threat actor is motivated mainly by ideology and activism?

Hacktivist.

20
New cards

What is Shadow IT?

Use of IT systems or services without explicit organizational approval.

21
New cards

Give two Bluetooth-specific attack names.

BlueBorne and BlueSmack (others include Bluesnarfing, Bluejacking, Bluebugging).

22
New cards

Which wireless security protocol introduces SAE and Enhanced Open?

WPA3.

23
New cards

What protocol adds digital signatures to e-mail headers for integrity/authentication?

DKIM (DomainKeys Identified Mail).

24
New cards

Which DNS attack alters a resolver’s cache to redirect traffic?

DNS Cache Poisoning (DNS Spoofing).

25
New cards

What tool class unifies log collection, correlation, and alerting?

SIEM (Security Information and Event Management).

26
New cards

Give two advantages of automating security with SOAR.

Faster reaction time and consistent, repeatable responses (also reduced human error, workforce multiplier, etc.).

27
New cards

What is the primary purpose of a honeypot?

Act as a decoy system to attract and study attackers while protecting real assets.

28
New cards

Explain the difference between symmetric and asymmetric encryption.

Symmetric uses one key for encryption/decryption; asymmetric uses a public/private key pair.

29
New cards

Which asymmetric algorithm is based on factoring large prime numbers?

RSA.

30
New cards

What hashing function family includes SHA-256 and SHA-512?

SHA-2 family.

31
New cards

What is a birthday attack?

A cryptographic attack that seeks two inputs producing the same hash (collision).

32
New cards

What does FDE stand for and what does it protect?

Full-Disk Encryption; protects data at rest on an entire storage drive.

33
New cards

Describe a ‘race condition’.

A vulnerability where the timing of events lets an attacker manipulate shared resources before proper validation.

34
New cards

Which Windows feature centrally administers password and security policies?

Group Policy via Active Directory (GPO).

35
New cards

Give the five steps of the CompTIA incident-response model.

Preparation, Detection, Analysis, Containment, Eradication, Recovery, Post-Incident Activity.

36
New cards

What is the first action after discovering ransomware on a workstation?

Isolate/disconnect the machine from the network to stop spread.

37
New cards

Define ‘MTTR’.

Mean Time To Repair – average time to restore a failed component.

38
New cards

What backup type stores data in geographically separate facilities?

Off-site backups (can be to cloud).

39
New cards

Which redundancy configuration mirrors data across two drives?

RAID 1.

40
New cards

Name two common threat-intelligence feed types.

Open-Source Intelligence (OSINT) and Proprietary/Commercial feeds.

41
New cards

What is a ‘false positive’ alert?

Security system flags benign activity as malicious when it is not.

42
New cards

Which NIST publication gives guidelines for media sanitization?

NIST SP 800-88.

43
New cards

What does EDR stand for and what is its role?

Endpoint Detection and Response; continuous monitoring and response on endpoint devices.

44
New cards

Which 802.1X component actually authenticates the user’s credentials?

The Authentication Server (often a RADIUS server).

45
New cards

What are the two major wireless bands and their non-overlapping 2.4 GHz channels?

2.4 GHz and 5 GHz; channels 1, 6, 11 are non-overlapping in 2.4 GHz.

46
New cards

What is the main goal of input validation in web applications?

Ensure only properly formed data is processed, preventing injection attacks like SQLi and XSS.

47
New cards

Which protocol secures IP traffic at layer 3 and provides ESP & AH?

IPsec.

48
New cards

Name one advantage of containerization over full VM virtualization.

Lightweight; shares host OS kernel resulting in faster startup and lower resource use.

49
New cards

What cloud security concern arises from multiple tenants sharing hardware?

Shared physical server vulnerabilities (e.g., side-channel attacks, VM escape).

50
New cards

State one benefit of Single Sign-On (SSO).

Users authenticate once to access multiple services, improving usability and reducing password fatigue.

51
New cards

What document formally authorizes system operation and accepts residual risk?

Authority to Operate (ATO), although not explicit above, contextual in governance.

52
New cards

Which encryption tool is embedded in many CPUs for hardware key storage?

TPM (Trusted Platform Module).

53
New cards

Define ‘compensating control’.

Alternate security measure put in place when a primary control is not feasible or has failed.

54
New cards

What log source would best indicate repeated failed logins on a server?

Operating-system security logs / authentication logs.

55
New cards

Name three motivational triggers used by social engineers.

Authority, Urgency, Social Proof (also Scarcity, Likability, Fear).

56
New cards

What is the purpose of a degausser?

Create a strong magnetic field to irreversibly erase data on magnetic media.

57
New cards

Which toolset provides open-standard automation of vulnerability management (includes OVAL, XCCDF)?

SCAP (Security Content Automation Protocol).

58
New cards

What does CVE stand for?

Common Vulnerabilities and Exposures – unique identifiers for publicly known vulnerabilities.

59
New cards

Explain a ‘split-tunnel’ VPN.

Only specific traffic routes through the VPN; other traffic goes directly to the internet.

60
New cards

Identify one key difference between SNMP v2 and v3.

SNMP v3 adds authentication and encryption (integrity, confidentiality), whereas v1/v2 use plaintext community strings.

61
New cards

What is a ‘bounce’ or ‘reflector’ in a DDoS amplification attack?

An intermediary server (e.g., open DNS resolver) used to reflect and amplify traffic toward a victim.

62
New cards

Describe ‘pass the hash’.

Using stolen password hash values to authenticate without cracking the plaintext password.

63
New cards

Which policy enforces removal of user access once employment terminates?

De-provisioning policy (part of IAM lifecycle).

64
New cards

What is a ‘purple-team’ penetration test?

Integrated testing where red (offense) and blue (defense) teams collaborate to improve security.

65
New cards

Which access-control model bases decisions on attributes like user role, resource type, and environment?

ABAC – Attribute-Based Access Control.

66
New cards

What technique blindfolds a camera by overloading its sensor with light?

Blinding sensors/cameras (a bypass of surveillance systems).

67
New cards

Name two services generally included in a cloud-based SASE solution.

SD-WAN networking plus cloud-delivered security such as CASB, FWaaS, or Zero-Trust access.

68
New cards

What document records every identified risk and its status throughout a project?

Risk Register.

69
New cards

When should the ‘backout plan’ in change management be executed?

When a change causes unexpected problems and must be reversed to the previous stable state.

70
New cards

Give one core benefit of Infrastructure as Code (IaC).

Consistency/Repeatability—servers and configurations are deployed identically every time via code.

71
New cards

What are the three elements of the CIA triad?

Confidentiality, Integrity, and Availability.

72
New cards

Which two additional principles expand the CIA triad into the CIANA Pentagon?

Non-repudiation and Authentication.

73
New cards

What are the three "Triple-A" pillars of security?

Authentication, Authorization, and Accounting.

74
New cards

In CompTIA’s Security+ (SY0-701) exam, which domain has the highest weighting?

Domain 4 – Security Operations at 28 %.

75
New cards

What is Zero Trust’s fundamental assumption?

Never trust; always verify every device, user, and transaction.

76
New cards

Name the two planes that make up a Zero-Trust architecture.

Control Plane and Data Plane.

77
New cards

In Zero Trust, which component actually enforces an allow/deny decision?

Policy Enforcement Point (PEP) in the Data Plane.

78
New cards

What are the core tenets of Zero Trust?

The core tenets of Zero Trust are: Verify explicitly, use least privilege, and assume breach.

79
New cards

Define a ‘threat’ in cybersecurity terms.

Anything that can exploit a vulnerability and cause harm to information systems.

80
New cards

Where does risk exist in relation to threats and vulnerabilities?

At the intersection where a threat matches a corresponding vulnerability.

81
New cards

List five common methods to protect confidentiality.

Encryption, Access Controls, Data Masking, Physical Security, Training/Awareness.

82
New cards

What security goal ensures undeniable proof of an action?

Non-repudiation.

83
New cards

Something you know, have, are, do, and somewhere you are.

Give the five typical authentication factors.

84
New cards

What is the difference between a vulnerability scan and a penetration test?

A scan passively identifies weaknesses; a pen test actively exploits them to prove impact.

85
New cards

Which document outlines specific remediation steps, resources, and timelines?

POA&M (Plan of Action and Milestones).

86
New cards

What are the four broad categories of security controls?

Technical, Managerial, Operational, and Physical.

87
New cards

Name at least four security control TYPES.

Preventive, Deterrent, Detective, Corrective, Compensating, Directive.

88
New cards

Which risk management strategy transfers risk to another party?

Risk Transference (e.g., through insurance or contractual clauses).

89
New cards

Name three common risk management strategies.

Risk Acceptance, Risk Mitigation, and Risk Avoidance.

90
New cards

Define ‘script kiddie’.

An unskilled attacker who uses pre-made tools or scripts created by others.

91
New cards

Which threat actor is motivated mainly by ideology and activism?

Hacktivist.

92
New cards

What is an 'insider threat'?

A security risk from someone within the organization (current or former employee, contractor, etc.) who has authorized access.

93
New cards

What is Shadow IT?

Use of IT systems or services without explicit organizational approval.

94
New cards

Give two Bluetooth-specific attack names.

BlueBorne and BlueSmack (others include Bluesnarfing, Bluejacking, Bluebugging).

95
New cards

Which wireless security protocol introduces SAE and Enhanced Open?

WPA3.

96
New cards

What protocol adds digital signatures to e-mail headers for integrity/authentication?

DKIM (DomainKeys Identified Mail).

97
New cards

What is SPF in email security?

Sender Policy Framework – an email validation system designed to prevent email spoofing by verifying sender IP addresses.

98
New cards

Which DNS attack alters a resolver’s cache to redirect traffic?

DNS Cache Poisoning (DNS Spoofing).

99
New cards

What tool class unifies log collection, correlation, and alerting?

SIEM (Security Information and Event Management).

100
New cards

Give two advantages of automating security with SOAR.

Faster reaction time and consistent, repeatable responses (also reduced human error, workforce multiplier, etc.).