1/8
Flashcards covering key vocabulary from Security+ SY0-701 course material.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Integrity
Ensuring data is not altered or destroyed unintentionally.
Non-Repudiation
Denies an author the ability to deny that they have created something
Threat Vectors
Used to identify and exploit vulnerabilities.
Attack Surface
The areas exposed to attack.
Network-based Attacks
Eavesdropping on a network to gather information
Crossover Error Rate
Comparing two potential identities to see if they are likely the same.
Single Sign On
Allowing a user to log in once and access multiple related, but independent, software systems.
Forensics
A methodology for gathering and examining digital information for use as evidence in a civil or criminal court.
Chain of Custody
The chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence.