CompTIA Sec+

0.0(0)
Studied by 8 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/264

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:47 PM on 5/16/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

265 Terms

1
New cards

Chapter 1 - General Security Concepts

2
New cards

Primary types of security controls

  1. Technical

  2. Managerial

  3. Operational

3
New cards

Technical controls

Implemented using systems (operating system controls, firewalls, anti-virus, etc.)

4
New cards

Managerial controls

Administrative measures focused on the management of risk and the oversight of cybersecurity systems (e.g. admin controls, security policies, standard operating procedures)

5
New cards

Operational controls

Implemented by people (security guards, awareness programs), focused on day-to-day procedures

6
New cards

Physical controls

Limit physical access (locks, badge readers, fences, etc.)

7
New cards

Preventive controls

Designed to stop security incidents before they occur by limiting access to resources or preventing unauthorized actions (e.g. firewalls)

8
New cards

Corrective controls

Apply after an event has already happened

9
New cards

Compensating controls

Control using other means, prevents exploitation of a weakness rather than directly addressing the weakness (block instead of patch, separation of duties, backup power generator)

10
New cards

Directive controls

Directing someone toward security compliance (sign: authorized personnel only)

11
New cards

CIA Triad

Fundamental principles of security

  1. Confidentiality: prevent disclosure of info to unauthorized people/systems (e.g. encryption)

  2. Integrity: no modifications with detection, stored/transferred as intended (e.g. digital certificate)

  3. Availability: systems/networks continue to run as intended (e.g. redundancy, fault tolerance)

12
New cards

Non-repudiation

Inability to deny what has been said, like signing a contract

13
New cards

IRP

14
New cards

Acceptable Use Policy (AUP)

Set of rules and guidelines that define acceptable and unacceptable behaviors when using an organization’s computer systems, networks, and digital resources

15
New cards

AAA

  1. Authentication: requires proof of identity (e.g. password)

  2. Authorization: determines level of access

  3. Accounting: tracking resource usage by account

16
New cards

Solutions for AAA functionality

  • TACACS+:

  • RADIUS:

17
New cards

Security Assertion Markup Language (SAML)

Uses XML to exchange data for both authentication and authorization for SSO between identity providers (IdP) and service providers (SP), commonly used in enterprise environments and legacy systems

18
New cards

Digital certificate

Digital document that verifies the identity of an individual, device, service, or organization in online communications

19
New cards

Public key infrastructure (PKI)

Hierarchical framework for the creation, management, storage, distribution, and revocation of digital certificates

20
New cards

Simple Certificate Enrollment Protocol (SCEP)

Automates the issuance and management of certificates within a PKI environment

21
New cards

Online Certificate Status Protocol (OCSP)

Verifies the revocation status of digital certificates in real time

22
New cards

Certificate Authority (CA)

Trusted entity that issues digital certificates to verify the ownership of public keys. Does so by creating a cert from a device, signing it with the organization’s CA, and putting it onto the device. It then checks the cert for authentication

23
New cards

Gap analysis

Comparing current to desired security position, done by evaluating current systems and weaknesses and creating a path towards baseline

24
New cards

Zero Trust

No assumed trust, continually verifies access for every person/process/device through security checks. Split into:

  • Data plane: process

25
New cards

Adaptive identity

26
New cards

Threat scope reduction

Decreasing potential entry points to a system

27
New cards

Types of access control

  • Discretionary (DAC): owner of a resource determines who can access it

  • Mandatory (MAC): assigns security labels to both users and resources to determine access

  • Role-based (RBAC): permissions are based on a user’s role within an organization

  • Rule-based (RuBAC): access is determined by predefined rules based on conditions such as time, location, or device type

  • Attribute-based (ABAC): considers user attributes (e.g. job title, department, location), resource attributes (e.g. sensitivity level), and environmental conditions (e.g. time of day, network location)

  • Policy-based (PBAC): uses dynamic policies to manage access

28
New cards

Peer-to-peer (P2P)

Decentralized network where participants interact directly without relying on a central server or intermediary

29
New cards

Point-to-point Tunneling Protocol (PPTP)

Obsolete VPN network protocol that encapsulates PPP frames within IP packets

30
New cards

Security zones

Delineates where you are coming from and where you are going in a network (e.g. untrusted network → trusted network), as well as which zones can access other zones

31
New cards

Policy Enforcement Point (PEP)

Acts as a gatekeeper for resources by intercepting, monitoring, and/or terminating access requests

32
New cards

Policy engine

Evaluates decisions based on policies (e.g. grant, deny, revoke)

33
New cards

Policy admin

Provides the access control policies that are enforced by the PEP

34
New cards

Group Policy Objects (GPO)

Windows feature used for centrally managing and enforcing policies and settings for users and computers in a network

35
New cards

Access control vestibule

Room that you must pass through to access the rest of the building

36
New cards

Honeypots

Used to lure and trap attackers to a fake target in order to buy time and conduct recon

37
New cards

Honeynets

Made up of multiple honeypots

38
New cards

Honeyfiles

Files with fake info, sends an alert when they are accessed

39
New cards

Honey tokens

Traceable fake data that can be monitored for suspicious activity (e.g. API creds, fake email addresses, browser cookies)

40
New cards

Change management

Defines how to make changes with software, patching applications, and/or firewall settings. Requires clear policies on change frequency, duration, and rollback procedures

41
New cards

Backout plan

Method of reverting changes through system backups

42
New cards

Standard operating procedure (SOP)

An organization’s instructions for performing specific tasks or responding to incidents consistently and efficiently

43
New cards

PBKDF2

Enables secure conversion of user passwords into cryptographic keys

44
New cards

Key Distribution Center (KDC)

Centralized server that is used to distribute cryptographic keys and authenticate users and services within a network

45
New cards

Key escrow

Process of storing private encryption keys with a trusted third-party, useful if keys are lost or for managing data access

46
New cards

Recovery Agent (RA)

A trusted third party (an individual, entity, or system) who is authorized to assist in the retrieval of encryption keys and data on behalf of the data owner

47
New cards

Electronic Code Book (ECB)

Simplest mode of operation for block ciphers, used to encrypt data in fixed-size blocks using the same key

48
New cards

Counter Mode (CTM)

Block cipher mode that combines a unique counter with encryption key to generate a stream of pseudorandom data blocks which are then used for encrypting data

49
New cards

Galois/Counter Mode (GCM)

Combines CTM for encryption with an authentication mechanism to ensure both data confidentiality and integrity

50
New cards

Cipher Feedback (CFB)

Block cipher mode that transforms a block cipher into a stream cipher, thus enabling the encryption of individual bits or bytes of data

51
New cards

Cipher Block Chaining (CBC)

Block cipher mode that works by chaining ciphertext blocks together, such that each block depends on the previous block

52
New cards

Out-of-band vs in-band key exchange

Out-of-band: exchanging keys outside of the network (e.g. in-person)


In-band: exchanging keys on the network, requires asymmetric encryption

53
New cards

Trusted platform module (TPM)

Embedded microcontroller in a device’s motherboard that is designed to secure hardware with integrated cryptographic keys. Used for secure boot, disk encryption, and system integrity verification

54
New cards

Hardware security module (HSM)

Higher end hardware for larger environments with associated software/firmware, stores thousand of cryptographic keys and has faster cryptographic functions

55
New cards

Secure enclave

Isolated hardware processor for cryptographic keys and real-time encryption

56
New cards

System on a Chip (SoC)

An integrated circuit combining components typically found in a standard computer system onto a single microchip

57
New cards

Self-encrypting drive (SED)

An HDD or SSD that uses hardware-based encryption to automatically encrypt all data written to it and decrypt data when read

58
New cards

Full Disk Encryption (FDE)

Encrypting all data stored on a device’s hard drive, including the operating system, applications, user files, temporary files, and system logs

59
New cards

Steganography

Hiding information in an image file, can also be done with audio/video files

60
New cards

Tokenization

Replacing sensitive data with tokens which are then transferred over a network. Unlike hashing/encryption, tokens are not related to the original data. Common for credit card processing

61
New cards

Data masking

Hides some portions of data while keeping the original intact

62
New cards

Hash salt

Random data added to a password when hashing, useful for slowing down brute-force attacks

63
New cards

RSA

An asymmetric encryption algorithm that uses a public key for encryption and a private key for decryption, suitable for bulk data encryption, used for secure communications, digital signature, and key exchange

64
New cards

Pretty Good Privacy (PGP) vs GNU Privacy Guard (GPG)

Pretty Good Privacy (PGP): proprietary encryption software owned by Symantec, used for secure email communication and data protection

GNU Privacy Guard (GPG): FOSS implementation of the OpenPGP standard

65
New cards

Data Encryption Key (DEK)

Symmetric key used to protect data

66
New cards

Key Encryption Key (KEK)

Cryptographic key used to encrypt and protect other keys

67
New cards

Master Boot Record (MBR)

Contains data about partitions and the bootloader, used in older non-UEFI based PCs

68
New cards

Chapter 2

69
New cards

Shadow IT

An internal team of threat actors that builds their own infrastructure, uses their own funds and cloud based services

70
New cards

SHTTP

Obsolete protocol used for secure data transfer over the web

71
New cards

Simple Mail Transfer Protocol (SMTP)

Used for sending email messages between mail servers or from a client device to a mail server

72
New cards

Simple Mail Transfer Protocol Secure (SMTPS)

Deprecated TLS-based method for secure transmission of email messages

73
New cards

Secure/Multipurpose Internet Mail Extensions (S/MIME)

Obsolete protocol that allows for digitally signing emails

74
New cards

FTP vs SFTP

FTP: older, unencrypted protocol

SFTP: runs over SSH, thus ensuring end-to-end encryption

75
New cards

Multimedia Messaging Service (MMS)

Messaging service that allows users to send content such as images, videos, and audio along with text messages to mobile devices

76
New cards

IPsec

Secure network protocol and technology suite that provides encryption, authentication, and data integrity for network traffic, runs in one of the following modes:

  • Transport mode: provides encryption only for the payload (the data part of the packet)

  • Tunnel mode: provides entire packet encryption

77
New cards

Encapsulation Security Payload (ESP)

Core protocol of IPsec that provides confidentiality, data integrity, and authentication

78
New cards

Layer 2 Transport Protocol (L2TP)

Tunneling protocol used to support VPNs and deliver services by ISPs, doesn’t encrypt data on its own and instead relies on IPsec to do so

79
New cards

CCMP

Encryption protocol used in Wi-Fi networks implementing the WPA2 security standard

80
New cards

Elliptic Curve Cryptography (ECC)

Public-key cryptographic system that is ideal in low-resource devices, such as IoT, embedded, and mobile devices

81
New cards

War dialing

Identifying devices such as modems and computers that are connected to the public switched telephone network PSTN, could lead to access to systems

82
New cards

Bluesnarfing

Gaining unauthorized access to a Bluetooth device

83
New cards

Bluejacking

Sending unsolicited messages over Bluetooth to Bluetooth-enabled devices

84
New cards

Managed Service Provider (MSP)

IT solution for a company that needs IT services but lacks any IT personnel

85
New cards

Managed Security Service Provider (MSSP)

Third-party vendor that offers IT security management services

86
New cards

Watering hole attack

Targets employees by infecting websites that they use with malware

87
New cards

Memory injection

Malicious code that runs in memory through malware hidden in legitimate processes

88
New cards

Address Space Layout Randomization (ASLR)

OS security technique that randomizes the location of key data areas in memory, adds a layer of defense against memory-based attacks

89
New cards

Cross-site scripting (XSS)

Executing JavaScript in a victim’s browser, often to gain control over an application or user

  1. Reflected: scripts come from current HTTP requests (attacker sends a request and gets a response), limited since you can mostly only target yourself

  2. Stored: scripts are stored in a database and retrieved later, can attack multiple users

  3. DOM-based: client-side has vulnerable JS that uses untrusted user input

90
New cards

Cross-Site Request Forgery (CSRF)

Transmitting unauthorized commands from a user’s browser to a website without their consent. The attacker’s script then executes on the website

91
New cards

Jailbreaking/rooting

Replacing a smartphone’s existing OS with custom firmware, allows for circumvention of security features

92
New cards

Zero-day

An attack without a patch or method of mitigation

93
New cards

Rootkit

Gains unauthorized access into a computer while being hidden from system and its users

94
New cards

Radio Frequency Identification (RFID)

Wireless technology for identifying and tracking tags attached to objects without requiring line-of-sight

95
New cards

RFID cloning

Duplicating RFID to gain unauthorized access

96
New cards

Amplified DDOS Attack

Type of DDoS attack wherein an attacker sends a small, specially crafted DNS query containing a spoofed IP address (the victim’s IP) to a compromised DNS server. Upon receiving the query, the DNS server generates a much larger response packet, which is then sent to the victim's IP address, causing potential disruption due to overwhelming traffic

97
New cards

Reflected DDOS Attack

Utilizing third-party servers to reflect and amplify attack traffic towards the target

98
New cards

Friendly DOS

Unintentional or well-intentioned actions that cause services shutdowns

99
New cards

DNS spoofing/poisoning

Modifying a DNS server or client host file, or sending a fake response to a valid DNS request

Can reroute DNS server so that it redirects users to a malicious site whenever a specific IP is received

100
New cards

Domain hijacking

Providing false DNS information to a DNS resolver for the purpose of redirecting or manipulating the resolution of domain names to malicious IP addresses. Legitimate domain registrants end up losing control over their domain names due to unlawful actions of third parties