4.0 CompTIA Security+ (SY0-701) Security Operations

0.0(0)
studied byStudied by 1 person
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/205

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:15 AM on 3/12/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

206 Terms

1
New cards

Secure baselines

Establishing, deploying, and maintaining hardened targets to ensure a secure starting point for systems

2
New cards

Hardening targets

Securing various types of devices, including mobile devices, workstations, switches, routers, cloud infrastructure, servers, ICS/SCADA, embedded systems, real-time operating systems (RTOS), and Internet of Things (IoT) devices

3
New cards

Wireless devices

Devices that connect wirelessly, such as mobile devices, laptops, and IoT devices

4
New cards

Installation considerations

Factors to consider when installing wireless devices, including performing site surveys and creating heat maps to optimize coverage and minimize interference

5
New cards

Mobile device management (MDM)

A system used to manage and secure mobile devices within an organization, including device provisioning, configuration, and monitoring

6
New cards

Deployment models

Different models for deploying mobile devices, including bring your own device (BYOD), corporate-owned personally enabled (COPE), and choose your own device (CYOD)

7
New cards

Connection methods

Different methods for connecting wireless devices, including cellular networks, Wi-Fi, and Bluetooth

8
New cards

Wireless security settings

Settings and protocols used to secure wireless networks, such as Wi-Fi Protected Access 3 (WPA3), Remote Authentication Dial-In User Service (RADIUS), cryptographic protocols, and authentication protocols

9
New cards

Application security

Protecting applications from vulnerabilities, including input validation, secure cookies, static code analysis, and code signing

10
New cards

Sandboxing

Isolating applications to prevent them from accessing sensitive resources or compromising the system

11
New cards

Monitoring

Continuous monitoring of systems and networks for security threats and anomalies

12
New cards

Acquisition Process

The process of obtaining assets for an organization.

13
New cards

Assignment Process

The process of assigning ownership and classifying assets.

14
New cards

Monitoring Process

The process of tracking and managing inventory of assets.

15
New cards

Inventory

A detailed list of all assets owned by an organization.

16
New cards

Enumeration Process

The process of counting and recording the number of assets.

17
New cards

Disposal Process

The process of getting rid of assets that are no longer needed.

18
New cards

Sanitization Process

The process of removing sensitive data from assets before disposal.

19
New cards

Destruction Process

The process of physically destroying assets to prevent recovery of data.

20
New cards

Certification Process

The process of verifying that assets have been properly disposed of.

21
New cards

Data Retention

The process of storing and managing data for a specified period of time.

22
New cards

Identification methods

Techniques used to identify vulnerabilities in a system

23
New cards

Vulnerability scan

Process of scanning a system to identify potential vulnerabilities

24
New cards

Application security

Measures taken to secure applications from vulnerabilities

25
New cards

Static analysis

Analyzing an application's source code without executing it to identify vulnerabilities

26
New cards

Dynamic analysis

Analyzing an application's behavior during runtime to identify vulnerabilities

27
New cards

Package monitoring

Monitoring software packages for vulnerabilities

28
New cards

Threat feed

Source of information about current threats and vulnerabilities

29
New cards

Open-source intelligence (OSINT)

Gathering information from publicly available sources to identify vulnerabilities

30
New cards

Proprietary/third-party

Information obtained from private or external sources to identify vulnerabilities

31
New cards

Information-sharing organization

Group that facilitates the sharing of cybersecurity information

32
New cards

Dark web

Part of the internet not indexed by search engines, often used for illegal activities

33
New cards

Penetration testing

Simulated attack on a system to identify vulnerabilities

34
New cards

Responsible disclosure program

Program that encourages reporting of vulnerabilities to the system owner

35
New cards

Bug bounty program

Program that rewards individuals for finding and reporting vulnerabilities

36
New cards

System/process audit

Examination of a system/process to assess compliance and effectiveness

37
New cards

Analysis

Process of examining vulnerabilities and assessing their impact

38
New cards

Confirmation

Validating whether a vulnerability is real or not

39
New cards

False positive

Incorrectly identifying a non-existent vulnerability

40
New cards

False negative

Failing to identify an actual vulnerability

41
New cards

Prioritize

Ranking vulnerabilities based on their severity and potential impact

42
New cards

Common Vulnerability Scoring System (CVSS)

Standardized system for assessing the severity of vulnerabilities

43
New cards

Common Vulnerability Enumeration (CVE)

Standardized naming scheme for vulnerabilities

44
New cards

Vulnerability classification

Categorizing vulnerabilities based on their characteristics

45
New cards

Exposure factor

Measure of the potential impact of a vulnerability

46
New cards

Environmental variables

Factors that influence the impact of a vulnerability in a specific environment

47
New cards

Industry/organizational impact

Assessing the impact of vulnerabilities on specific industries or organizations

48
New cards

Risk tolerance

An organization's willingness to accept or mitigate risks

49
New cards

Vulnerability response and remediation

Actions taken to address and fix vulnerabilities

50
New cards

Patching

Applying updates or fixes to software to address vulnerabilities

51
New cards

Insurance

Coverage to mitigate financial losses due to cybersecurity incidents

52
New cards

Segmentation

Dividing a network into smaller segments to contain potential attacks

53
New cards

Compensating controls

Alternate security measures implemented to mitigate vulnerabilities

54
New cards

Exceptions and exemptions

Allowances made for specific cases where vulnerabilities cannot be immediately addressed

55
New cards

Validation of remediation

Process of verifying that vulnerabilities have been successfully addressed

56
New cards

Rescanning

Performing another vulnerability scan after remediation

57
New cards

Audit

Examination of systems/processes to ensure compliance and effectiveness

58
New cards

Verification

Confirming that vulnerabilities have been fixed and are no longer present

59
New cards

Reporting

Documenting and communicating the findings and actions taken

60
New cards

Monitoring computing resources

The process of tracking and observing computer systems, applications, and infrastructure to ensure their optimal performance, security, and availability.

61
New cards

Log aggregation

The practice of collecting and consolidating log data from various sources, such as servers, applications, and network devices, to gain a comprehensive view of system activities and troubleshoot issues.

62
New cards

Alerting

The act of notifying users or administrators about potential issues or threats detected by monitoring systems, enabling timely response and mitigation.

63
New cards

Scanning

The process of examining computer systems or networks to identify vulnerabilities, security weaknesses, or potential risks that may compromise their integrity or confidentiality.

64
New cards

Reporting

The generation and presentation of information about the status or performance of computing resources, providing insights for decision-making, troubleshooting, and compliance purposes.

65
New cards

Archiving

The practice of storing data for long-term retention and future reference, ensuring its availability and integrity for compliance, analysis, or historical purposes.

66
New cards

Alert response and remediation/validation

The process of taking immediate action to address and resolve identified alerts, followed by validation to ensure the effectiveness of the response and mitigate potential risks.

67
New cards

Quarantine

The act of isolating potentially compromised systems or resources to prevent further harm, containing the impact of security incidents and facilitating investigation and remediation.

68
New cards

Alert tuning

The adjustment of alert settings to reduce false positives or improve detection accuracy, optimizing the monitoring system's ability to identify genuine threats and minimize unnecessary notifications.

69
New cards

Security Content Automation Protocol (SCAP)

A set of standards and specifications for automating security-related tasks, including vulnerability management, configuration assessment, and compliance checking.

70
New cards

Benchmarks

Reference points or standards used to evaluate and measure system performance or security, providing a basis for comparison, optimization, and adherence to industry best practices.

71
New cards

Agents/agentless

Software agents or methods that collect and transmit data for monitoring purposes, or monitoring without the need for dedicated agents, respectively.

72
New cards

Security information and event management (SIEM)

A system that collects and analyzes security event data from various sources, enabling real-time threat detection, incident response, and compliance monitoring.

73
New cards

Antivirus

Software designed to detect, prevent, and remove malicious software, protecting computer systems and data from viruses, worms, trojans, and other types of malware.

74
New cards

Data loss prevention (DLP)

Technologies and strategies aimed at preventing unauthorized access or leakage of sensitive data, ensuring its confidentiality, integrity, and availability.

75
New cards

Simple Network Management Protocol (SNMP) traps

Notifications sent by network devices to a central management system for monitoring and troubleshooting, providing information about network events, performance, and errors.

76
New cards

NetFlow

A network protocol used for monitoring and collecting IP traffic information, enabling network administrators to analyze and optimize network performance, detect anomalies, and troubleshoot issues.

77
New cards

Vulnerability scanners

Tools that identify and assess vulnerabilities in computer systems or networks, helping organizations proactively address security risks and strengthen their overall security posture.

78
New cards

Firewall

A security device that monitors and controls network traffic based on predetermined rules.

79
New cards

Access lists

Lists of rules that determine network traffic permissions.

80
New cards

Ports/protocols

Specific communication endpoints and rules for transmitting data between devices.

81
New cards

Screened subnets

A network architecture that separates and protects internal networks from external networks using firewalls.

82
New cards

IDS/IPS

Intrusion Detection System/Intrusion Prevention System - Security systems that monitor network traffic for suspicious activity and prevent attacks.

83
New cards

Trends

Patterns in network security threats and attacks.

84
New cards

Signatures

Patterns of known malicious activity used by IDS/IPS systems to identify and block threats.

85
New cards

Web filter

A security tool that blocks or filters web content based on predefined rules or categories.

86
New cards

Agent-based

A type of web filter that requires software installation on devices to enforce web filtering policies.

87
New cards

Centralized proxy

A server that acts as an intermediary between client devices and the internet, providing web filtering and caching.

88
New cards

URL scanning

The process of analyzing URLs to determine if they are safe or malicious.

89
New cards

Content categorization

The classification of web content into categories based on its nature or purpose.

90
New cards

Block rules

Rules that prevent access to specific websites or web content.

91
New cards

Reputation

A measure of the trustworthiness or reliability of a website or IP address based on historical data.

92
New cards

Operating system security

Measures and practices to protect the operating system of a computer or device from unauthorized access or attacks.

93
New cards

Group Policy

A feature in Windows operating systems that allows administrators to manage and enforce security settings across a network.

94
New cards

SELinux

Security-Enhanced Linux - A security framework for Linux that provides access control and mandatory access control policies.

95
New cards

Secure protocols

Configuring and using communication protocols to protect data during transmission.

96
New cards

Protocol selection

Choosing the appropriate network protocol based on security requirements and compatibility.

97
New cards

Port selection

Choosing specific network ports for communication based on security and functionality needs.

98
New cards

Transport method

The method used to transmit data between devices, such as wired or wireless communication.

99
New cards

DNS filtering

Blocking or allowing access to websites or domains based on DNS queries.

100
New cards

Email security

Measures and protocols to protect email communication from unauthorized access or malicious content.