CompTIA Security+ (SY0-701) Practice Exam

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Get a hint
Hint

Information Security

Get a hint
Hint

Act of protecting data and information from unauthorized access, unlawful alteration, and disruption. It involves implementing measures and protocols to ensure confidentiality, integrity, and availability of information.

Get a hint
Hint

Information System Security

Get a hint
Hint

Act of protecting the information system's integrity, confidentiality, and availability from threats and vulnerabilities.

Card Sorting

1/149

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

150 Terms

1
New cards

Information Security

Act of protecting data and information from unauthorized access, unlawful alteration, and disruption. It involves implementing measures and protocols to ensure confidentiality, integrity, and availability of information.

2
New cards

Information System Security

Act of protecting the information system's integrity, confidentiality, and availability from threats and vulnerabilities.

3
New cards

Confidentiality

Ensuring that sensitive information is accessed only by authorized individuals and kept secret from unauthorized parties.

4
New cards

Integrity

Ensuring that information is accurate, reliable, and protected from unauthorized modification or destruction.

5
New cards

Availability

Ensuring that information and resources are accessible and usable when needed by authorized users.

6
New cards
7
New cards

Non-repudiation

The assurance that someone cannot deny the validity of their signature or the sending of a message, ensuring accountability in transactions.

8
New cards

Authentication

The process of verifying the identity of a user, device, or entity before granting access to systems and data.

9
New cards

Accounting

The process of tracking and recording user activities and resource utilization, often for auditing and compliance purposes.

10
New cards

Security controls

Measures implemented to protect information systems from threats and vulnerabilities, ensuring confidentiality, integrity, and availability.

11
New cards

Zero trust

A security model that assumes no user or device is trustworthy by default until verified, enforcing strict access controls and continuous verification.

12
New cards

Control plane

Consists of the adaptive identity, threat scope reduction, policy-driven access control, and secured zones

13
New cards

Threat

An event or circumstance that has the potential to cause harm to an information system, including data breaches, malware, and unauthorized access.

14
New cards

Vulnerability

A weakness in a system that can be exploited by threats to gain unauthorized access or cause damage, often due to flaws in software, hardware, or organizational processes.

15
New cards

Confidentiality

The principle of protecting information so that only authorized individuals have access to it, ensuring privacy and preventing unauthorized disclosure.

16
New cards

Encryption

The process of converting information or data into a code to prevent unauthorized access, ensuring that only those with the correct decryption key can read it.

17
New cards

Access controls

Measures that restrict access to information and resources based on user identity and permissions, ensuring that only authorized personnel can access sensitive data.

18
New cards

Data masking

The process of obscuring specific data within a database to protect it from unauthorized access while still allowing for data analysis and processing.

19
New cards

physical security measures

Procedures and controls designed to protect physical assets and facilities from unauthorized access, damage, or interference.

20
New cards

Training and awareness

Initiatives designed to educate employees about security policies, potential threats, and safe practices to enhance organizational security posture.

21
New cards

Integrity

The assurance that data is accurate and trustworthy, preventing unauthorized modifications or alterations.

22
New cards

Hashing

A process that transforms input data into a fixed-size string of characters, which is typically a sequence of numbers and letters, used to ensure data integrity by producing a unique output for unique inputs.

23
New cards

Digital signatures

Use encryption to ensure integrity and authenticityof digital messages or documents, allowing the recipient to verify the sender's identity and the message's integrity.

24
New cards

Checksums

A method used to verify the integrity of data by producing a fixed-size value from input data, which changes if the data is altered.

25
New cards

Access controls

Ensures that only authrorized individuals have permission to access, use, or modify resources, protecting sensitive information from unauthorized access.

26
New cards

Regular audits

Involves reviewing logs and operations to ensure that only authorized changes have been made and any discrepancies are addressed.

27
New cards

3 Nines

A reliability standard indicating that a system or service is operational 99.9% of the time, allowing for minimal downtime.

28
New cards

Server redundancy

A method of ensuring system availability by deploying multiple servers to take over in case one fails, minimizing downtime.

29
New cards

Data redundancy

The practice of storing duplicate copies of data in different locations to ensure availability and prevent data loss in case of hardware failure or corruption.

30
New cards

Digital signature

A cryptographic mechanism that verifies the authenticity and integrity of a message or document, ensuring it has not been altered and confirming the identity of the sender.

31
New cards

Authentication

The process of verifying the identity of a user or system, typically through credentials such as passwords, biometrics, or digital certificates.

32
New cards

Something you know

that serves as a credential in authentication, such as a password or PIN. It is one of the key factors in authentication, alongside something you have (like a token) and something you are (like biometrics).

33
New cards

Something you have

a physical object used as a credential for authentication, such as a security token, smart card, or mobile device. It is one of the key factors in authentication, along with something you know and something you are.

34
New cards

Something you do

refers to a method of authentication based on user actions or behaviors, such as typing patterns or gestures. It complements the other factors in authentication, focusing on how a user interacts with systems.

35
New cards

Somewhere you are

is a factor in authentication that relies on the user's physical location, such as an IP address or GPS data. It helps determine access rights based on a specific geographic location.

36
New cards

Multi factor authentication

is a security measure that requires two or more verification factors to gain access to a resource, enhancing security by combining something you know, something you have, and something you are.

37
New cards

Two factor authentication

is a subset of multi-factor authentication that requires two distinct forms of verification from the categories of knowledge, possession, or inherence, to enhance the security of user access.

38
New cards

Authorization

is the process that determines what resources a user can access and what actions they are allowed to perform after authentication has been successfully established.

39
New cards

Accounting

is the process of granting or denying access rights to resources based on user identity and permissions, ensuring that only authorized individuals can access specific data or functionalities.

40
New cards

Audit trail

is a record that logs all activities performed by users within a system, enabling administrators to track changes, access, and actions for security and compliance purposes.

41
New cards

Regulatory compliance

ensures that organizations follow laws, regulations, and guidelines that govern their industry, including data protection and privacy standards.

42
New cards

Forensic analysis

is the process of collecting, preserving, and examining electronic data in a way that ensures its integrity, often for use in legal proceedings.

43
New cards

Syslog servers

are servers that collect and store logs from various network devices and systems in real time, aiding in monitoring, troubleshooting, and auditing.

44
New cards

SIEM

(Security Information and Event Management) is a software solution that aggregates and analyzes security alerts from various sources in real time, helping organizations detect and respond to security threats effectively.

45
New cards

Technical controls

Security measures implemented to protect information systems, ensuring confidentiality, integrity, and availability.

46
New cards

Managerial or administrative controls

refer to policies, procedures, and guidelines that govern an organization's security processes and practices, focusing on risk management and compliance.

47
New cards

Operational control

refers to the day-to-day security measures and practices that ensure the effectiveness of technical and managerial controls, including the management of security incidents and compliance with security policies.

48
New cards

Preventive controls

are security measures designed to prevent security incidents before they occur, such as firewalls, access controls, and encryption.

49
New cards

Deterrent controls

are security measures aimed at discouraging individuals from engaging in malicious activities, such as warning signs, security guards, and surveillance cameras.

50
New cards

Detective controls

are security measures that identify and respond to security incidents after they occur, such as intrusion detection systems, log monitoring, and audits.

51
New cards

IDS

refers to Intrusion Detection Systems, which monitor network or system activities for malicious activities or policy violations, providing alerts for potential security breaches.

52
New cards

Corrective controls

are security measures that take action to restore systems or processes to normal after a security incident, such as patch management, system recovery, and incident response.

53
New cards

Compensating controls

are alternative security measures implemented to fulfill the requirement of a primary control that cannot be deployed for some reason. (backup)

54
New cards

Directive controls

are security measures that establish policies, procedures, and guidelines to influence and direct behavior concerning information security.

55
New cards

Zero trust

is a security model that requires strict identity verification for every person and device attempting to access resources on a network, regardless of whether they are inside or outside the network perimeter.

56
New cards

Control plane

is the part of a network that carries signaling information, managing the operations and provisioning of the network. It is distinct from the data plane, which carries the actual user data.

57
New cards

Adaptive identity

is a security approach that uses real-time information and algorithms to dynamically manage user identities and access rights based on risk assessments.

58
New cards

Threat scope reduction

is the process of minimizing potential attack surfaces by implementing various security measures to limit exposure of vulnerabilities and reduce the likelihood of successful cyberattacks.

59
New cards

Policy driven access control

is a method of restricting access to resources based on predefined policies that determine who can access what under specific conditions. This approach ensures that access rights are managed according to the organization's security requirements.

60
New cards

Secured zones

are defined areas within a network that enforce strict access controls and security measures to protect sensitive data and systems from unauthorized access or threats.

61
New cards

Policy administrator

is an individual or role responsible for managing and enforcing security policies within an organization, ensuring compliance and proper implementation of access control measures.

62
New cards

Subject/system

is a component or entity that requests access to resources or performs actions within a system, often evaluated against access control policies to determine its permissions.

63
New cards

Policy enforcement point

is a mechanism or component within a security architecture that enforces access control and security policies by making decisions on whether to allow or deny requests based on defined rules. (gate keeper)

64
New cards

Gap analysis

is a method used to assess the differences between current and desired performance, identifying areas that require improvement to achieve specific security objectives.

65
New cards

Technical gap analysis

is a specialized form of gap analysis focused on evaluating the technical capabilities of systems and processes against the required security standards or benchmarks.

66
New cards

Business gap analysis

is a method for assessing the differences between the current business operations and desired outcomes, focusing on identifying operational inefficiencies and gaps in processes.

67
New cards

Plan of Action Milestones

(POAM) is a document that outlines specific tasks, responsibilities, and timelines for addressing identified security weaknesses or deficiencies within an organization, ensuring that remediation efforts are effectively tracked and managed.

68
New cards

Threat actor attributes

is an individual or group that aims to compromise the security of an organization by exploiting vulnerabilities, stealing data, or damaging systems.

69
New cards

Unskilled attackers

are individuals or groups who lack the knowledge or skills to execute sophisticated cyberattacks. They often use readily available tools or scripts to exploit vulnerabilities without a deep understanding of the underlying technologies.

70
New cards

Hacktivists

are individuals or groups that use hacking techniques to promote social or political causes, often targeting organizations that they believe are unethical or unjust.

71
New cards

Organized crime

refers to structured groups engaged in illegal activities, often for profit. These groups may leverage cybercrime tactics to commit fraud, steal data, or facilitate other forms of organized criminal enterprise.

72
New cards

Nation-state actors

are government-sponsored groups or individuals who engage in cyber operations, often for strategic or military purposes, targeting other nations' infrastructure or sensitive data.

73
New cards

Insider threats

are security risks that originate from within an organization, often involving employees or contractors who have inside information regarding an organization's security practices, data, or computer systems.

74
New cards

Shadow IT

refers to information technology systems and solutions used inside an organization without explicit approval or oversight from the IT department, posing security risks.

75
New cards

Honeypots

are decoy systems designed to attract cyber attackers, allowing organizations to study their tactics and improve security measures.

76
New cards

Honeynets

are networks of honeypots deployed to monitor and analyze malicious activity, providing insights into attack strategies and behaviors.

77
New cards

Honeytokens

are pieces of data like a fabricated user credential that are deliberately planted to detect unauthorized access or usage, alerting organizations to potential breaches.

78
New cards

Data exfiltration

is the unauthorized transfer of data from a computer or network, often carried out by cyber attackers to steal sensitive information.

79
New cards

LulzSec

is a hacker group known for its high-profile cyber attacks and breaches, often targeting corporations and government agencies for entertainment and political statements.

80
New cards

50 days of Lulz

refers to a period during which the hacker group LulzSec executed a series of impactful cyber attacks, showcasing their capabilities and garnering media attention.

81
New cards

Fin7

is a cybercriminal organization known for conducting sophisticated attacks against financial institutions and retail companies, often using advanced techniques for data theft and financial fraud.

82
New cards

Carbanak

is a cybercriminal group that uses advanced malware to target financial institutions worldwide, enabling large-scale theft of funds through online banking and automated transactions.

83
New cards

Stuxnet

is a computer worm that specifically targets industrial control systems, notably used to attack Iran's nuclear facilities, showcasing the potential for cyber warfare.

84
New cards

Shadow IT

refers to the use of information technology systems and services without the approval or knowledge of an organization’s IT department. This can lead to security risks and non-compliance with policies.

85
New cards

Threat vector

is a pathway or method used by cyber attackers to gain unauthorized access to a network or system. This includes various tactics such as phishing, malware, or exploiting vulnerabilities. (How)

86
New cards

Attack surface

is the total sum of vulnerabilities or points of entry within an organization's systems or applications that can be exploited by attackers. Reducing the attack surface is crucial for enhancing cybersecurity. (Where)

87
New cards

BlueBorne

is a collection of vulnerabilities affecting Bluetooth devices that allow attackers to execute code or gain unauthorized access to devices without user interaction, posing significant security risks.

88
New cards

BlueSmack

a type of Denial of service attack that targets Bluetooth enabled devices by sending a specially crafted Logical Link Control and Adaptation Protocol packet to a target device

89
New cards

Tactics, techniques, and procedures

(TTPs) refer to the behavior patterns and methodologies used by cyber adversaries to execute their attacks, encompassing various strategies, tools, and phases of an attack.

90
New cards

Deception and disruption technologies

designed to mislead, confuse

and divert attackers away from critical assets

while simultaneously detecting and neutralizing threats.

91
New cards

Honeyfiles

files intentionally placed to attract and deceive attackers, providing insights into their methods and behavior.

92
New cards

Bogus DNS

refers to deceptive Domain Name System entries meant to redirect users to unintended or malicious destinations, often used in phishing attacks.

93
New cards

Decoy directories

folders set up to mislead attackers into thinking they have accessed valuable information, while protecting real data.

94
New cards

Dynamic page generation

the process of creating web pages in real-time based on user input or interaction, often using server-side scripting languages.

95
New cards

Port triggering

a technique used in routers to allow specific outgoing traffic to open ports for incoming responses, enhancing security while enabling specific applications.

96
New cards

Fake telemetry data

configured to respond

by sending out fake telemetry or network data.

This data can be used to confuse an attacker

and make it more challenging

for them to understand the network's real layout,

and prevent them

from being able to identify genuine vulnerabilities

in your systems.

97
New cards

Bollards

short, sturdy vertical posts designed to control

or prevent access by vehicles to an area or structure.

98
New cards

Fences

barriers that are usually made

of posts and wire, or boards that are erected to

enclose a space or separate areas.

99
New cards

Surveillance systems

A surveillance system is an organized strategy

or setup designed to observe and report activities

within a given area using cameras, sensors, and recording equipment.

100
New cards

Access controlled vestibule

double-door system

that's designed with two doors that are electronically

controlled to ensure the only one door can be open

at a given time.