Comptia Security+ 701

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/185

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

186 Terms

1
New cards

What are the four categories of Security Controls?

Technical

Managerial

Operational

Physical

Tmop

2
New cards

What are the six control types?

Preventive

Deterrent

Detective

Corrective

Compensating

Directive

Press down down circle circle down

3
New cards

What is a technical control?

Their primary focus is on upholding system integrity, mitigating the risk of unauthorized access, and protecting sensitive data from potential threats

Firewalls and data encryption

4
New cards

Preventive Controls

They focus on eliminating or minimizing potential threats before they can cause harm

Examples: Firewalls, employee training, and quality control checks

5
New cards

Deterrent Controls

controls aim to discourage individuals from engaging in undesirable behaviors or activities.

Examples of these controls include surveillance cameras, warning, and strong passwords and multi-factor authentication

6
New cards

Detective Control

controls are implemented to identify and detect problems or risks that have already occurred.

Examples of these controls include regular financial audits and Security Information and Event Management (SIEM) systems

7
New cards

Corrective Controls

put in place to address problems or risks after they have been identified. They aim to rectify the situation, mitigate the impact, and restore normalcy

Examples of this include implementing a backup and recovery

8
New cards

Compensating Controls

alternative measures implemented when primary controls are not feasible or sufficient. They help offset the limitations or deficiencies of other controls.

Examples of this include requiring additional layers of approval, utilizing a secondary authentication method when the primary method fails or is unavailable, and increasing physical security measures when technical controls are compromised

9
New cards

Directive Controls

involve providing specific instructions or guidelines to ensure compliance with policies, procedures, or regulations

Examples of this include a code of conduct or ethical guidelines, standard operating procedures (SOPs), and regulatory requirements that mandate specific reporting procedures for financial institutions

10
New cards

Managerial Control

They encompass the implementation of policies, procedures, and practices by management to guide and direct the activities of individuals and teams

Examples include: Performance Reviews, Risk Assessments, Code of conduct

11
New cards

Operational Control

the execution of day-to-day activities and processes necessary for delivering goods and services.

Examples: Incident response procedures, Security awareness training, User access management

12
New cards

Physical Control

focusing on the protection of an organization's tangible assets, facilities, and resources.

Examples: access control vestibule, mantraps, biometrics

13
New cards

Non-repudiation

prevents denial of actions, ensuring accountability and reliability in electronic transactions and communications

Through authentication, digital signatures, and audit trails, it safeguards electronic interactions

14
New cards

Data Plane

in cybersecurity this is the operational core responsible for the actual movement and forwarding of data packets within a network. It focuses on executing tasks such as routing, switching, and packet forwarding based on predefined rules and policies.

15
New cards

Implicit Trust zones

This refers to areas within a network or system where certain levels of trust are assumed without explicit verification.

16
New cards

Subjects in a data plane

the entities that initiate data communication

17
New cards

Systems in the data plane

These represent the collective infrastructure, resources, and devices that are responsible for processing and forwarding data packets as they traverse the network

Example: routers, firewalls, switches and load balancers

18
New cards

Demilitarized Zone (DMZ)

an area that is neither fully trusted nor fully untrusted. It's an intermediate zone that allows controlled access to certain services from the external network.

Also known as a screened subnet

19
New cards

Policy enforcement point

allow or restrict access, and it will effectively act as a gatekeeper to the sensitive areas of the systems or networks

20
New cards

What are the four types of sensors?

Infrared

Pressure

Microwave

Ultrasonic

21
New cards

Infrared

These detect heat signature changes, effectively identifying human or animal presence. They find applications in perimeter protection and indoor security.

22
New cards

Pressure

Sensing changes in pressure from touch or step, these provide reliable indicators of movement, both indoors and outdoors.

23
New cards

microwave

Emitting microwave pulses and detecting frequency alterations caused by moving objects, these sensors excel in diverse security scenarios.

24
New cards

Ultrasonice

Operating with sound waves, ultrasonic sensors "see" around corners or within concealed areas, proving valuable in challenging environments

25
New cards

Impact Analysis

This analysis helps in foreseeing potential security risks and finding ways to address them before they become real problems.

26
New cards

Public Key Infrastructure (PKI)

you gain the ability to issue and manage digital certificates, which serve as virtual credentials that enable secure identification and authentication of users, devices, and servers in various applications.

Issues pairs of public and private keys

27
New cards

Public Key

is designed for widespread dissemination and can be freely shared without compromising security

The role of this is to encrypt data and validate digital signatures.

Format is p7b and the file extension is .cer

28
New cards

Private Key

must be kept confidential and secure to prevent unauthorized access. It is retained and never distributed. Often stored in digital or hardware-based cryptographic devices

The primary function is decryption

Format is p12 and the file extension is .pfx

29
New cards

Key Escrow

a trusted third party responsible for securely storing copies of cryptographic keys. This serves as a safety net in scenarios where the original key holder loses access

30
New cards

Hardware Security Module (HSM)

a specialized hardware device designed to provide robust security measures for the management and protection of cryptographic keys, sensitive data, and cryptographic operations.

They are used to safeguard digital assets, ensure secure key storage, and perform cryptographic operations with a high level of trust and integrity.

31
New cards

asymmetric encryption

there are two keys, the private and the public keys

Examples include RSA, Diffie-Hellman, and Elliptic Curve Cryptography (ECC)

32
New cards

Symmetric Encryption

employs a single key and block cipher to safeguard vast volumes of data, ensuring both security and expedience.

Examples are:

Data Encryption Standard (DES—56 bit), the Triple Data Encryption Standard (3DES—168 bit), and the more popular Advanced Encryption Standard (AES—256 bit)

33
New cards

Key Exchange

securely delivering cryptographic keys from sender to receiver.

34
New cards

Algorithms

transform plaintext into a jumble of characters (ciphertext)

35
New cards

Key Length

the measure of their resistance against attacks

The longer the more resistance

36
New cards

What is obfuscation and where is it used often?

deliberately making code, data, or information more complex and difficult to understand.

This technique is often used in software development to deter reverse-engineering attempts and protect intellectual property

37
New cards

Steganorgraphy

Hiding data inside images or audio files

38
New cards

Tokenization

transforming sensitive data into unique tokens that hold no inherent value

39
New cards

Data Masking

disguising sensitive data by replacing original values with fictitious ones

40
New cards

Key stretching

a cryptographic technique designed to transform a password into a longer, more complex key

41
New cards

Block chain

data batches that are distributed across countless computers,

42
New cards

Open Public ledger

a digital record of all transactions that have ever occurred within the blockchain network

43
New cards

What are the six benefits to an open public ledger?

Decentralization

Security

Transaction recording

Consensus mechanisms

Immutable and chronological

Transparency:

44
New cards

What are the two types of certificate authorities?

online are in real time and offline prioritize security by working in isolated environments

45
New cards

Certificate Revocation List (CRL)

These lists contain the serial numbers of certificates that have been revoked, compromised, or expired. CAs maintain these and publish them regularly

46
New cards

Online Certificate Status Protocol (OCSP)

enables real-time certificate validation by allowing systems to query the CA's server directly

47
New cards

What are the five types of certificate authorities?

Self signed

Third party

Root of trust

Certificate signing requests

wildcard

48
New cards

Self-signed

is a digital certificate that is generated and signed by the same entity it is issued to

49
New cards

Root of trust

the starting point of trust in a PKI, which is a self-signed certificate that acts as the anchor for the entire certificate chain

50
New cards

Third party

Are like online IDS

these certificates are recognized globally, like self-signed certificates, making them trustworthy

51
New cards

Certificate Signing Request (CSR)

When an individual or organization seeks to obtain a digital certificate from a trusted CA

52
New cards

Wildcard

A single certificate can be installed on multiple servers within the same domain, thereby reducing the cost of purchasing multiple certificates

53
New cards

What are the seven forms of encryption?

Level

Full-disk

Partition

File

Volume

Database

Record

54
New cards

Level (encryption)

The scope or layer at which encryption is applied

55
New cards

Full Disk Encryption (FDE)

a robust security measure designed to protect the data stored on a computer's hard drive or Solid-State Drive (SSD)

56
New cards

Partition (encryption)

Encrypts a single partition

57
New cards

File (encryption)

Encrypts individual files

58
New cards

Volume (encryption)

Encrypts selected files or directories

59
New cards

Database (encryption)

An encryption method that targets databases and the data they contain, rather than individual files or whole disks.

60
New cards

Record (encryption)

technique by encrypting discrete records within databases or other data repositories

61
New cards

What are the four types of segementation?

Physical

Virtual Local Area Network

Subnetting

Micro-segmentation

62
New cards

Physical Segementation

This method separates a network into smaller segments using routers, switches, and firewalls. It's like building different rooms within a fortress, each with a unique access control.

Ideal for large organizations

63
New cards

Virtual Local Area Network (VLAN)

create logical network segments within a single switch.

commonly used to group devices based on function or department, reducing broadcast traffic and enhancing network efficiency.

64
New cards

Subnetting

The act of dividing a network into smaller logical subnetworks.

65
New cards

Micro-segmentation

applying security policies to individual workloads or devices.

66
New cards

What are the four methods of configuration enforcement?

Standardization

Vulnerability mitigation

Compliance adherence

Automation

SVCA

67
New cards

Standarization

these baselines are used to establish a consistent set of security configurations across an organization's devices, software, and systems.

68
New cards

Vulnerability mitigation

The steps to reduce or eliminate the vulnerabilities

69
New cards

Compliance adherence

Configuration enforcement helps organizations achieve and maintain compliance, thus avoiding costly fines and reputational damage.

70
New cards

Automation

enabling real-time detection and rectification of deviations from security policies.

71
New cards

Isolation

the practice of creating secure, self-contained environments within an enterprise's network. Its purpose is to confine critical systems or sensitive data.

can also be used to control a malware attack

72
New cards

Patching

Regular updates and fixes

73
New cards

Encryption

Process of converting readable data into unreadable characters to prevent unauthorized access.

74
New cards

Security Information and Event Management (SIEM)

Operates in real time, centralizing and correlating logs from servers and network devices and capturing network traffic.

Provides reports of threats to security center.

75
New cards

Security orchestration, automation, and response (SOAR)

Works in real time to tackle threats. Users AI and ML algorithms, with their capacity to decipher patterns, detect anomalies, and make data-driven decisions at lightning speed.

Has playbooks of predefined auctions in response to incidents.

76
New cards

Endpoint Detection and Response (EDR)

A real-time solution that uses AI and ML technologies as part of their capabilities. It is specifically crafted to oversee, identify, and react to security incidents and potential threats throughout an organizations infrastructure and network endpoints like computers, servers, and mobile devices

77
New cards

Host-based intrusion prevention system (HIPS)

A security solution designed to protect individual computer systems or hosts from unauthorized access, malicious activities, and cyber threats.

78
New cards

Host-based firewall

Software firewalls that run on individual devices. They monitor and control incoming and outgoing network traffic at the device level

79
New cards

What are the four different types of Cloud models?

Public

Private

Community

Hybrid

80
New cards

Logical segmentation

refers to dividing the network into smaller parts. This division is based on logical rather than physical boundaries.

81
New cards

Software Defined Networking (SDN)

fine-grained control over network traffic by enabling dynamic security policies and can respond to security threats in real time by isolating compromised segments of the network when an attack is detected.

Three major planes to it:

Management Plane - monitors traffic

Control plane - makes high level decisions

Data Plane - consists of network devices and forward data packets based on instructions from control plane.

82
New cards

Network Infrastructure

a mixture of networking devices, protocols, and routing packets that all work together in an interconnected environment

Ex: OSI Model

83
New cards

Physical Isolation

an isolated computer or standalone system that isn't connected to any external networks or the internet.

84
New cards

Air-gapped network

no devices within that network have cable or wireless connections from which data might be stolen.

85
New cards

Tunneling

a networking technique used to secure and encrypt data as it travels over potentially untrusted networks, ensuring the privacy, integrity, and safe passage of information

86
New cards

Platform Diversity

Implementing diverse technologies for resilience

87
New cards

Multi-cloud systems

Leveraging multiple cloud providers for redundancy

88
New cards

Continuity of Operations Plan (COOP)

a comprehensive strategy that enables organizations to continue essential functions and services during and after disruptive events

aims to build resilience into an organization's infrastructure, systems, and processes. This includes redundancy in critical systems, data backups, and alternate communication methods. The goal is to reduce single points of failure

89
New cards

Site survey

a comprehensive analysis of the environment, which includes identification of sources of interference, such as load-bearing walls, cordless phones, microwaves, elevators, metal frames, metal doors, and radio waves

90
New cards

Heat map

By visually pinpointing areas with subpar coverage on the map, administrators can efficiently identify potential issues, including malfunctioning WAPs, which may be the root cause of the problem

91
New cards

Security Content Automation Protocol (SCAP)

a framework that enables compatible vulnerability scanners to see whether a computer adheres to a predefined configuration baseline.

92
New cards

Open Vulnerability and Assessment Language (OVAL

This is an XML-based schema designed to describe the security state of a system and query information related to vulnerabilities.

93
New cards

Extensible Configuration Checklist Description Format (XCCDF)

XML schema, is utilized to create and audit best practice configuration checklists and rules.

94
New cards

when do you use a host based firewall?

Ideal for safeguarding personal devices; it operates right on your desktop

95
New cards

network based firewall

Perfect for protecting the borders of your network, ensuring unauthorized access is prevented

96
New cards

stateless firewall

Best suited when you need to inspect application traffic and permit or block based on application behavior, a stateful firewall knows the size and format of each type of network packet.

97
New cards

stateful firewall

Use when you want to keep things straightforward, such as allowing or blocking packets without a deep-level analysis of the data in the packets

98
New cards

web application firewall

Essential when you need to protect your web applications from online threats

99
New cards

Unified Threat Management Firewall (UTM)

The go-to when you need an all-in-one security solution

100
New cards

Next-Generation Firewall (NGFW)

Your choice for advanced protection, with intrusion prevention capabilities in both on-premise and cloud environments