CompTIA SY0-701 Security+ Essential Vocabulary

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/23

flashcard set

Earn XP

Description and Tags

Comprehensive vocabulary flashcards covering fundamental security concepts, threats, cryptography, identity management, and risk processes for the CompTIA SY0-701 exam.

Last updated 6:32 PM on 4/12/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

24 Terms

1
New cards

CIA Triad

The cornerstone of information security consisting of Confidentiality (authorized access), Integrity (unaltered data), and Availability (reliable access).

2
New cards

Non-repudiation

A security concept ensuring that a person cannot deny performing a specific action, often achieved through digital signatures.

3
New cards

Gap Analysis

The process of identifying deviations between an organization's current security systems and the requirements of a cybersecurity framework.

4
New cards

Managerial Controls

Security controls that provide oversight of information systems, such as risk identification and evaluation tools.

5
New cards

Compensating Controls

Alternative security measures used to satisfy a requirement when a primary control is too difficult or expensive to implement.

6
New cards

Zero-Day Vulnerability

A software or hardware flaw that is unknown to the developer and for which no patch yet exists.

7
New cards

Advanced Persistent Threat (APT)

An adversary, often nation-state backed, with sophisticated levels of expertise and significant resources that allow it to maintain ongoing access to a network.

8
New cards

Attack Surface

The total sum of all points where a threat actor can interact with, and potentially exploit, a network or system.

9
New cards

Pharming

A social engineering attack that redirects users from legitimate websites to malicious ones by corrupting name resolution (DNS).

10
New cards

Symmetric Encryption

A cryptographic method that uses the same secret key for both encryption and decryption.

11
New cards

Asymmetric Encryption

Also known as public key cryptography, it uses a pair of related keys (public and private) for encryption and decryption.

12
New cards

Perfect Forward Secrecy (PFS)

A feature of key agreement protocols that ensures session keys are not compromised even if the server's private key is stolen in the future.

13
New cards

Trusted Platform Module (TPM)

A dedicated cryptoprocessor chip on a motherboard used for secure key generation, storage, and hardware-based authentication.

14
New cards

Multifactor Authentication (MFA)

An authentication method that requires two or more distinct types of factors, such as something you know, something you have, or something you are.

15
New cards

Least Privilege

The principle that users should be granted only the minimum level of access or permissions needed to perform their job functions.

16
New cards

Zero Trust Architecture (ZTA)

A security model that assumes no inherent trust and requires continuous verification and authorization for every access request.

17
New cards

Software Defined Networking (SDN)

An architecture that abstracts network functions into management, control, and data planes to simplify configuration through automation and APIs.

18
New cards

Honeypot

A decoy system designed to mimic a real production system to attract and monitor attacker activity.

19
New cards

Endpoint Detection and Response (EDR)

Security software that provides real-time visibility and investigative capabilities into threats on endpoint devices.

20
New cards

Indicator of Compromise (IoC)

Evidence or residual signs that a system or network has been successfully breached by an attacker.

21
New cards

Data Sovereignty

The concept that data is subject to the laws and jurisdictional restrictions of the country where it is physically stored.

22
New cards

Business Impact Analysis (BIA)

A systematic process to determine the potential consequences of disrupting critical business functions.

23
New cards

Recovery Time Objective (RTO)

The maximum length of time that a business process can be down after a disaster before unacceptable consequences occur.

24
New cards

Data Loss Prevention (DLP)

Software solutions that identify, monitor, and protect sensitive data from unauthorized disclosure or transfer.