CompTIA SY0-701 Security+ Course Notes

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/15

flashcard set

Earn XP

Description and Tags

These flashcards encapsulate key vocabulary and concepts related to the CompTIA SY0-701 Security+ certification, providing a focused study aid for the exam.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

16 Terms

1
New cards

Security Controls

Measures put in place to prevent, detect, and respond to security risks.

2
New cards

CIA Triad

A model to guide policies for information security, consisting of Confidentiality, Integrity, and Availability.

3
New cards

Non-repudiation

A principle that ensures a party cannot deny the authenticity of their signature on a document or the sending of a message.

4
New cards

Authentication, Authorization, and Accounting (AAA)

A framework for controlling access to resources, consisting of user identification, validation of credentials, and tracking usage.

5
New cards

Zero Trust

A security model that requires strict identity verification for everyone trying to access resources in an organization, regardless of whether they are inside or outside the network.

6
New cards

Gap Analysis

A process for determining the difference between the current state and desired future state of an organization's security posture.

7
New cards

Public Key Infrastructure (PKI)

The framework for managing digital certificates and public-key encryption involving policies, procedures, hardware, software, and people.

8
New cards

Malware

Malicious software designed to harm, exploit, or otherwise compromise computer systems.

9
New cards

Phishing

A type of social engineering attack where attackers attempt to obtain sensitive information by masquerading as a trustworthy entity.

10
New cards

Encryption

The process of converting information into a code to prevent unauthorized access.

11
New cards

Vulnerability Scanning

An automated process for identifying security weaknesses in a system.

12
New cards

Incident Response

A structured approach to addressing and managing the aftermath of a security breach or cyberattack.

13
New cards

Business Continuity Plan (BCP)

A strategy that outlines how an organization will continue to function during and after a disaster.

14
New cards

Disaster Recovery Plan (DRP)

A documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster.

15
New cards

Firewall

A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

16
New cards

Access Control Lists (ACLs)

Rules that limit access to resources based on user identity, machine identity, or groups of users.