CompTIA Security+ Study

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 58

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

59 Terms

1

RDP Port

3389

New cards
2

Telnet Port

23

New cards
3

SSH Port

22

New cards
4

DNS Port

53

New cards
5

DHCP (server) Port

67

New cards
6

DHCP (client) Port

68

New cards
7

HTTP Port

80

New cards
8

HTTPS Port

443

New cards
9

LDAP Port

389

New cards
10

LDAPS Port

636

New cards
11

SMB Port

139

New cards
12

Kerberos Port

88

New cards
13

Strongest Encryption Algorithm

AES256

New cards
14

Strongest Hashing Algorithm

SHA256

New cards
15
  • Data Spread Across All Drives

  • Uses Striping

  • Minimum drives required: 2

RAID 0

New cards
16
  • Uses mirroring

  • Minimum drives required: 2

  • Good performance

  • Excellent redundancy

RAID 1

New cards
17
  • Uses striping and parity

  • Minimum disks required: 3

  • Good redundancy and performance

RAID 5

New cards
18
  • Uses striping and mirroring

  • Minimum drives required: 4

  • Excellent redundancy

  • Excellent performance

RAID 10

New cards
19

OSI Model

  1. Physical

  2. Data Link

  3. Network

  4. Transport

  5. Session

  6. Presentation

  7. Application

New cards
20

UTF (Unified Threat Management)

Device usually deployed at network boundaries that usually involves:

  • Firewall

  • IDS/IPS

  • Anti-malware

  • URL filtering

  • DLP

  • VPN

New cards
21

NGFW (Next Generation Firewall)

All in one network security device that uses:

  • Deep packet inspection

  • IDS/IPS functions

  • Faster and more capable than normal firewalls

New cards
22

Stateless Firewall

  • Basically just a packet filter

  • Looks at source IP, port, and protocol

New cards
23

Stateful firewall

  • Dynamic packet filter

  • Can make decisions about packets they are inspecting

  • Save packet information in a state table for more context when making future security decisions

New cards
24

Honeypot

Systems intentionally configured to appear vulnerable

New cards
25

Honeyfile

An intentionally attractive file used for IDS

New cards
26

Honeytoken

Fake credentials or data that are not used but look appealing to attackers

New cards
27

Forward proxy server

  • Client to server

  • Accepts requests from the client and sends it to the server

  • Can be used to allow access to server resources (ex Library database)

New cards
28

Reverse proxy server

  • Server to client

  • Used for load balancing and content caching

  • Clients query a single system but have their traffic load spread to multiple systems

New cards
29

DLP (Data loss prevention)

Used to make sure data isn’t extracted or sent out of. a secure network

New cards
30
New cards
31

Bluejacking

An attack that involves sending unsolicited messages to bluetooth devices

New cards
32

Bluesnarfing

gaining unauthorized access to a bluetooth device

New cards
33

Sideloading

transferring files to a mobile device to install applications outside of the official app store

New cards
34

Jailbreaking

taking advantages of OS vulnerabilities to conduct privilege escalation and root the system

New cards
35

Extensible Authentication Protocol (EAP)

  • commonly used wireless authentication framework

New cards
36

802.1X (NAC)

  • Integrates with EAP

  • Prevents access to the network until authentication is successful

  • Uses an access database to check authentication (RADIUS, LDAP, TACAS+)

New cards
37

EAP-FAST

  • EAP authentication through secure tunnelling

  • Authentication server (AS) and supplicant share a secret credential

  • Mutual Authentication through TLS tunnel

  • Authentication credentials send over TLS tunnel

  • Uses RADIUS server

New cards
38

PEAP

  • Protected EAP

  • Only server side certificates

New cards
39

EAP-TLS

  • Client and server both need certificates

  • Certificate based and mutual based wireless authentication

  • Need PKI

New cards
40

EAP-TTLS

  • EAP tunneled transport layer security

  • Requires a single digital certificate

  • Builds TLS tunnel with this certificate

  • Any authentication method can be used over the tunnel

New cards
41

RADIUS Federation

Used when members of one organization want to authenticate to the network of another organization

New cards
42

LEAP

  • Lightweight EAP

  • Uses WEP keys for authentication

New cards
43

Incident Response Process

  1. Preparation

  2. Detection

  3. Analysis

  4. Containment

  5. Eradication

  6. Recovery

  7. Lessons Learned

New cards
44

Forensic Order of Volatility

  1. CPU Cache and Registers

  2. Routing tables

  3. System memory (RAM)

  4. Temp files

  5. Data on the hard disk

  6. Remote logs

  7. Backups

New cards
45

Typical Model of Governance

  • Shareholders (elect)

  • Board of directors (who appoint)

  • CEO (who appoints)

  • Management team (who manage)

  • Employees

New cards
46

Centralized Governance

Top-Down Governance approach where central authority creates policy

New cards
47

Decentralized Governance

Bottom-up governance approach where individual units are delegated authority to achieve objectives. No higher ups enforcing policy.

New cards
48

Change Management Process

  1. Request

  2. Review

  3. Approve/Reject

  4. Test

  5. Schedule/Implement

New cards
49

ISO 27001

Document that outlines control objectives & categories

New cards
50

ISO 27002

Document that describes the actual security controls

New cards
51

ISO 27701

Document that gives guidance on managing privacy controls

New cards
52

ISO 31000

Documents guidelines for risk management programs

New cards
53

Risk formula

Liklihood * Impact

New cards
54

SLE (single loss expectancy) formula

AV (asset value) * EF (exposure factor)

New cards
55

ARO (annual rate of occurance)

The percentage of how many times the attack could happen in one year

New cards
56

ALE (annual loss expectancy) formula

SLE * ARO

New cards
57

AAA

  • Authentication

  • Authorization

  • Accounting

New cards
58

TPM (trusted plat form model)

This piece of hardware is used to validate secure boot processes

New cards
59

HSM (hardware security module)

This piece of hardware is used for encryption and key generation and validating digital signiatures

New cards

Explore top notes

note Note
studied byStudied by 1 person
86 days ago
5.0(1)
note Note
studied byStudied by 14 people
761 days ago
5.0(2)
note Note
studied byStudied by 66 people
511 days ago
5.0(1)
note Note
studied byStudied by 14 people
953 days ago
5.0(1)
note Note
studied byStudied by 5 people
926 days ago
4.0(1)
note Note
studied byStudied by 10 people
895 days ago
5.0(1)
note Note
studied byStudied by 11 people
972 days ago
4.5(2)
note Note
studied byStudied by 5237 people
150 days ago
4.4(9)

Explore top flashcards

flashcards Flashcard (28)
studied byStudied by 7 people
662 days ago
5.0(1)
flashcards Flashcard (96)
studied byStudied by 73 people
748 days ago
5.0(5)
flashcards Flashcard (43)
studied byStudied by 3 people
635 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 8 people
789 days ago
5.0(1)
flashcards Flashcard (170)
studied byStudied by 7 people
121 days ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 41 people
97 days ago
5.0(1)
flashcards Flashcard (1000)
studied byStudied by 29 people
852 days ago
4.0(1)
flashcards Flashcard (53)
studied byStudied by 3742 people
709 days ago
4.2(54)
robot