Security + Exam 701

0.0(0)
studied byStudied by 2 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/953

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:33 AM on 4/11/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

954 Terms

1
New cards

Risk Management

The process of identifying, assessing, and prioritizing risks followed by coordinated efforts to minimize, monitor, and control the probability or impact of unfortunate events.

2
New cards

Confidentiality

Refers to the protection of information from unauthorized access and disclosure

3
New cards

AAA

Stands for Authentication, Authorization, and Accounting, which are critical processes for ensuring secure access to resources.

4
New cards

CIANA

Confidentiality, Integrity, Availability, Non-repudiation, and Authentication, which are key principles in information security.

5
New cards

Encryption

is the process of converting information into a coded format to prevent unauthorized access, ensuring confidentiality and data protection.

6
New cards

Access Controls

Ensure only authorized personnel can access certain types of data

7
New cards

Data masking

is a data protection technique that obscures specific data within a database to protect sensitive information while retaining its usability for testing or analysis.

8
New cards

Physical security measures

are strategies and tools used to protect physical assets and facilities from unauthorized access, damage, or theft.

9
New cards

Hashing

Process of converting data into a fixed size value

10
New cards

Digital signature

Use encryption to ensure integrity and authenticity

11
New cards

Checksums

are values generated from data to verify its integrity by detecting errors or alterations.

12
New cards

Regular audits

are systematic evaluations of an organization's processes, controls, and compliance with regulations to ensure security and efficiency.

13
New cards

Availability

refers to the assurance that information and resources are accessible to authorized users when needed, ensuring continuous operation.

14
New cards

Redundancy

is the practice of duplicating critical components or functions of a system to increase reliability and availability in case of failure.

15
New cards

Server Redundancy

involves having multiple servers that can take over in case one fails, ensuring continuous service availability and minimizing downtime.

16
New cards

Data redundancy

is the practice of storing duplicate copies of data in multiple locations to prevent data loss and ensure availability in case of system failure.

17
New cards

Network redundancy

is the practice of having multiple network paths or devices to ensure connectivity and maintain service availability in case of a failure.

18
New cards

Power redundancy

is the practice of having multiple power sources or systems to ensure continuous power supply to critical systems and prevent downtime during power failures.

19
New cards

non-repudiation

is a security principle that ensures that a party in a transaction cannot deny the authenticity of their signature or the sending of a message, providing proof of the origin and integrity of the data.

20
New cards

Digital Signature (non-repudiation)

Created by first hashing a particular message or communication to be digital signed and encryption the hash digest with he user’s private key using asymmetric encryption

21
New cards

Authentication

Security measure that ensures individuals or entities are who they claim to be during a communication or transaction

22
New cards

5 common verification methods

Something you know

Something you have

Something you are

Something you do

Somewhere you are

23
New cards

Something you know

Relies on information that a user can recall

24
New cards

Something you have (possession factor)

Relies on the user presenting a physical item to authenticate themselves

25
New cards

Something you are (inherence factor)

Relies on the user providing a unique physical or behavioral characteristic of the person to validate that they are who they claim to be

26
New cards

Something you do (action factor)

Relied on the user conducting a unique action to prove who they are

27
New cards

Somewhere you are (location factor)

Relies on the user being in a certain geographical location before access is granted

28
New cards

Authorization

permissions and privileges granted to users or entities after they have been authenticated while also being a set of rules and policies that are used to dictate what actions users can perform once verified

29
New cards

Accounting

Security measure that ensures all user activities are properly tracked and recorded

30
New cards

Regulatory compliance

Maintains a comprehensive record of all the users activities

31
New cards

Forensic analysis

refers to a detailed investigation for detecting and documenting the course, reasons, culprits, and consequences of a security incident.

32
New cards

Syslog servers

a network device that collects, stores, and forwards log messages from other devices

33
New cards

network analyzer

the process of examining network traffic and related data to identify potential security threats and vulnerabilities by analyzing patterns and anomalies within the network activity

34
New cards

SIEM

Security information and event management

Provides real time analyses of security alerts generated by various hardware and software infrastructure in an organization

35
New cards

Technical control

Technologies, hardware , and software that are implemented to manager and reduce risks

EX. Firewalls, encryption processes, and IDSs

36
New cards

Managerial controls (administrative controls)

Involve the strategic planning and governance of security

EX.Risk assessment

37
New cards

Operational controls

the management of a business's day-to-day operations. It involves monitoring and adjusting processes, resources, and procedures to ensure that a business is efficient and effective and governed by internal processes and human actions.

EX. Password change every 90 days

38
New cards

Physical controls

tangible, real world measures taken to protect assets

EX. Security guards

39
New cards

Preventative controls

Proactive measures implemented to thwart potential security threats or breaches

Ex.Firewall

40
New cards

Detterent controls

Aim to discourage potential attackers by making the effort seem less appealing or more challenging

Ex. Sign OutFront that displays sign of home alarm system

41
New cards

Detective controls

Monitor and alert organizations to malicious activities as they occur or shortly thereafter

Ex. Security cameras

42
New cards

Corrective controls

Mitigate any potential damage and restore the systems to their normal state

43
New cards

Compensating controls

Alternative measures that are implemented when primary security controls are not feasible or effective

44
New cards

Directive controls

Often rooted in policy or documentation and set the standards for behavior within an organization

EX. AUP - acceptable use policy

45
New cards

Control plane

the central management system within a Zero Trust security architecture that governs access control, policy enforcement, and user/device verification

46
New cards

Adaptive identity

real time validation that takes into account the users behavior, device location, and more

47
New cards

Threat scope reduction

Limit the user’s access to only what they need for their work tasks because this drastically reduces the network potential attack surface

48
New cards

Policy driven access control

Entails developing, managing and enforcing user access policies based on their roles and responsibilities

49
New cards

Secured zones

Isolated environments within a network that are designed to house sensitive data

50
New cards

False Flag attack

Attack that is orchestrated in a way that it appears to originate from a different source or group

51
New cards

Threat vector

Pathway an attacker takes to gain unauthorized access to a computer or network to deliver a malicious payload or carry out an unwanted action

52
New cards

Attack surface

Gathers all the various points where the unauthorized user can try to enter data to or extract data from an environment

53
New cards

Evil Twin

refers to a fraudulent Wi-Fi access point that appears legitimate but is set up by a hacker to intercept user data by tricking them into connecting to it instead of the real network

54
New cards

Bluesmack

Bluetooth attack that knock our some Bluetooth enabled devices and is a DOS type attack

55
New cards

TTP (Note port related)

Tactics, techniques, and procedures

56
New cards

Honeypot

Decoy system or network set up to attract potential hackers

57
New cards

Honeynet

A network of honeypots created in a more complex manner that is designed to mimic an entire network of systems, including servers, routers, and switches

58
New cards

Honeyfile

Decoy file placed within a systems to lure in potential hackers

59
New cards

Honeytoken

Piece of data or a resource that has no legitimate value or use but is monitored for access or use

Ex A fake password that seems real

60
New cards

Dynamic page generation

Used in websites to present ever changing content to web crawlers to confused and slow down threat actor

61
New cards

Port triggering

Security mechanism where specific services or ports on a network device remain closed until a specific outbound traffic pattern is detected

62
New cards

Fake Telemetry

System can respond to attackers network scan attempt by sending out fake telemetry or network data

63
New cards

4 Area of Surveillance

Video surveillance

Security Guards

Lighting

Sensors

64
New cards

Infrared Sensors

Detect changes in infrared radiation that is emitted by warm bodies

65
New cards

Pressure sensors

Detected when a specified amount of weight is detected on the platform

66
New cards

Microwave sensors

Detect movement in an area by emitting microwave pulses and measuring their reflection off moving objects

67
New cards

Ultrasonic sensors

Measure the reflection of ultrasonic sound waves off moving objects

68
New cards

EMI

Electromagnetic interference

Jamming the signals that surveillance systems rely on to monitor the environment

69
New cards

FAR

False acceptance rate

70
New cards

FRR

False rejection rate

71
New cards

EER

Equal error rate

commonly known as the CER Crossover error rate, which uses a measure of the effectiveness of a given biometric system to achieve a balance

72
New cards

RFID

Radio frequency identifcation

73
New cards

NFC

Near field communication

74
New cards

BEC

Business email compromise

75
New cards

Business email compromise

advanced attack that uses internal email accounts within a company to manipulate employees into carrying out malicious actions for the attacker

76
New cards

Identity fraud

Attacker takes the victims credit card number and makes changes

77
New cards

Identity theft

Attacker tries to fully assume the identity of their victim

78
New cards

Misinformation

Inaccurate information shared unintentionally

79
New cards

Disinformation

Intentional spread of false information to deceive or mislead

80
New cards

DNS Spoofing attack

an attack involving manipulating DNS records to redirect users toward a fraudulent, malicious website that may resemble the user's intended destination.

81
New cards

Malware

Software designed to infiltrate a computers systems and possibly damage without the users consent

82
New cards

Threat vector

How the attacker breaks into the system

83
New cards

Attack vector

How the attacker breaks in and infects the system

84
New cards

Virus

Malicious software that attaches to clean files and spread into a computer system

85
New cards

Macro Virus

Form of code embedded inside a document that when opened by the user the virus us then executed

86
New cards

Program Virus

Tries to find executables or applications files to infect with their malicious code

87
New cards

Multipartite Virus

A combination of boot sector virus and a program virus where it loads itself upon booting and then installs itself in a program and can be run every time the computer starts up

88
New cards

Encrypted Virus

Hides itself from being detected by encrypting it’s malicious code to avoid detection

89
New cards

Polymorphic Virus

Advanced version of encrypted because it changes the virus code each time it is executed by altering the decryption module to evade detection

90
New cards

Metamorphic Virus

Able to rewrite itself entirely to infect a given file

91
New cards

Worm

Malicious software, like a virus, but is able to replicate itself without user interaction

92
New cards

Botnet

A network of compromised computers being controlled by a masternode

93
New cards

Zombies

A compromised computer or device that is part of a botnet being controlled remotely to maliciously perform tasks

94
New cards

Rootkit

Software that is designed to gain administrative level control over a given computer system without being detected

95
New cards

Kernel mode (ring zero)

Allows a systems to control access to things like device drivers, sound card, and monitor

96
New cards

DLL

Dynamic link library

97
New cards

Dynamic link library

Technique used to run code within the address space of another process by forcing it to load a dynamic link library

98
New cards
99
New cards

What is a DLL or Dynamic link library?

a file that contains code and data that can be used by multiple programs

100
New cards

Shim

Software code that is placed between two components