CompTIA Security+ 701 Study Guide Ch. 11 Notes

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/54

flashcard set

Earn XP

Description and Tags

CompTIA Security+ 701 Ch. 11

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

55 Terms

1
New cards

What are a few ways that operating systems can be vulnerable to attacks?

  1. Operating system itself is exposed

  2. Defaults such as default passwords

  3. Insecure settings

  4. Configuration issues

  5. Misconfiguration issues

2
New cards

Firmware

Embedded software that allows devices to function.

3
New cards

End of Sales

Last date at which a specific model or device will be sold

4
New cards

End of Life

When the equipment or device is no longer sold

5
New cards

End of Support

The last date on which the vendor will provide support and/or updates

6
New cards

Legacy

Typically is used to describe hardware, software, or devices that are unsupported.

7
New cards

Unified Extensible Firmware Interface (UEFI) firmware can leverage two different techniques to ensure the system is secure upon boot. What are they?

  1. Secure Boot

  2. Measured Boot

8
New cards

Secure Boot

Ensures that the system boots using only firmware that the original equipment manufacturer (OEM) trusts. To perform this, the system must have a signature database listing the secure signatures of trusted software and firmware for the boot process.

9
New cards

Measured Boot

These boot processes measure each component, starting with the firmware and ending with the boot start drivers. Does not validate against a known good list of signatures before booting; instead, it relies on the UEFI firmware to has the firmware, boot loader, driver, and anything else that is part of the boot process.

10
New cards

Trusted Platform Module (TPM)

A hardware component that provides secure storage for cryptographic keys and secure generation of random numbers, enabling features like Secure Boot and Measured Boot in UEFI firmware.

11
New cards

Hardware Security Modules (HSMs)

Typically external devices or plug-in cards used to create, store, and manage digital keys for cryptographic functions and authentication, as well as to offload cryptographic processing. 

12
New cards

Cryptographic key management systems

Are used to store keys and certificates as well as to manage them centrally.

13
New cards

One of the most common security tools is

Antivirus and antimalware software.

14
New cards

What are the most common methods:

  1. Signature-based detection

  2. Heuristic, or behavior based detection

  3. Artificial Intelligence (AI)

  4. Sandboxing

15
New cards

Signature-based Detection

Uses a hash or pattern-base signature detection method to identify files or components of the malware that have been previously observed. 

16
New cards

Heuristic (Behavior Based Detection)

Looks at what actions the malicious software takes and matches them to profiles of unwanted activities.

17
New cards

Artificial Intelligence or Machine Learning

Leverage large amounts of data to find ways to identify malware that may include heuristic, signature, and other detection capabilities.

18
New cards

Sandboxing

A security mechanism used to isolate and analyze potentially harmful applications in a controlled environment, preventing them from affecting the host system.

19
New cards

Allow Lists Tools

Allow you to build a list of software, applications, and other system components that are allowed to exist and run on the system.

20
New cards

Block Lists

List of software or applications that cannot be installed or run, rather than a list of what is allowed.

21
New cards

Endpoint Detection and Response (EDR)

Combine monitoring capabilities on endpoint devices and systems using a client or software agent with network monitoring and log analysis capabilities to collect, correlate, and analyze events.

22
New cards

Extended Detection and Response (XDR)

An advanced security response framework that integrates data from multiple security products to provide improved visibility, detection, and automated response across endpoint, network, and server environments.

23
New cards

Host-based firewalls

security solutions installed on endpoint devices that monitor and control incoming and outgoing network traffic based on predetermined security rules.

24
New cards

Host-based intrusion prevention system

A security solution that monitors and analyzes internal traffic on endpoint devices to prevent attacks by blocking or stopping malicious activities in real-time.

25
New cards

Hardening a system or application

invol

26
New cards
27
New cards
28
New cards
29
New cards
30
New cards
31
New cards
32
New cards
33
New cards
34
New cards
35
New cards
36
New cards
37
New cards
38
New cards
39
New cards
40
New cards
41
New cards
42
New cards
43
New cards
44
New cards
45
New cards
46
New cards
47
New cards
48
New cards
49
New cards
50
New cards
51
New cards
52
New cards
53
New cards
54
New cards
55
New cards