comptia security+ 2

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 3959

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

3960 Terms

1

CIA triad (Confidentiality, Integrity, Availability)

C (Prevent Unauthorized Disclosure), I (Ensures Data is not Altered in Transit), A (Ensures Accessibility of Data)

New cards
2

AAA Of Security

Authentication (Checks User Identity), Authorization (Determines what user is allowed to access), and Accounting (Auditing/Tracking (log events like login times, data transfers)

New cards
3

Checksums

Method to verify the integrity of data during transmission

New cards
4

Digital Signatures

Private Key Used to Sign Data. Ensure Both Integrity of data during transaction.

New cards
5

Server Redundancy

Involves using multiple servers in a load balanced or failover configuration so that if one is overloaded or fails, the other servers can take over the load to continue supporting your end users

New cards
6

Network Redundancy

Ensures that if one network path fails, the data can travel through another route

New cards
7

data redundancy

involves storing data in multiple places

New cards
8

Power Redundancy

involves using backup power sources, like generators and ups systems

New cards
9

Non-repudiation

provides undeniable proof in the world of digital transactions. Can’t deny participation or authenticity of their actions

New cards
10

Syslog servers

used to aggregate logs from various network devices and systems so that system administrators can analyze them to detect patterns or anomalies in the organizations systems

New cards
11

Technical Controls

"technology", hardware, and software mechanisms that are implemented to manage and reduce risks

New cards
12

Managerial Controls

("Managing" things) also referred to administrative controls, involve the strategic planning and governance side of security

New cards
13

Operational Controls

Procedures and measures that are designed to protect data on a day to day basis. Are mainly governed by internal processes and human actions

New cards
14

Preventive

Proactive measures implemented to thwart potentical security threats or breaches

New cards
15

Deterrent Controls

Discourage potential attackers by making the effort seem less appealing or more challenging

New cards
16

Detective Controls

(detect) Monitor and alert organizations to malicious activities as they occur

New cards
17

Corrective Controls

Mitigate any potential damage and restore our systems to their normal state

New cards
18

Compensating Controls

Alternative measures that are implemented when primary security controls are not feasible or effective

New cards
19

Directive Controls

Guide, inform, or mandate actions. Often rooted in Policy.

New cards
20

gap analysis

Process of evaluating the differences between an organizations current performance and its desired performance

New cards
21

Zero Trust

Demands verification for every device, user, and transaction with the network

New cards
22

Data plane

Ensures policies are properly executed

New cards
23

honeypot

decoy systems to attract and deceive attackers

New cards
24

honeynets

network of decoy systems for observing complex attacks

New cards
25

honeyfiles

decoy files to detect unauthorized access or data breaches

New cards
26

(APT) Advanced Persistent Threat

Nation-state actor because of their long term persistence and stealth

New cards
27

Threat Vector

Means or pathway by which an attacker can gain unauthorized access to a computer or network

New cards
28

Vishing

Voice Phishing

New cards
29

(MDM) Mobile device management

Manages Phones, remote wipe, geolocation, installs certain apps Ex) jampf

New cards
30

Smishing

SMS phishing

New cards
31

Unsecure networks Vulnerabilities

MAC Address cloning, VLAN Hopping

New cards
32

Vulnerability in Bluetooth protocol

Blueborne -- vulnerabilities in bluetooth technology that can allow can attacher to take over devices

BlueSmack -- type of DoS attack that targets bluetooth enabled devices

New cards
33

Vestibules

Double-door System electronically controlled to allow only one door open at a time, prevents piggybacking

New cards
34

Bollards

short vertical posts, typically made of steel. In front of government buildings alot

New cards
35

Microwave Sensors

detect movement in an area by emitting microwave pulses and measuring their reflection off moving objects

New cards
36

Ultrasonic sensors

Measures the reflection of ultrasonic waves off moving objects

New cards
37

Piggy backing

Involves two people working together with one person who has legitimate access intentionally allows another person who doesnt have proper authorization to enter a secure area with them

New cards
38

Cipher locks

mechanical locks with numbers push buttons, requires a correct combination to open

New cards
39

Typosquating

URL Hijacking,, hoping somebody puts in the wrong url and goes to your cloned website

New cards
40

Watering hole

Hackers take over a specific website that is normally frequented by a person or company

New cards
41

Viruses

attach to clean files, (spread), and corrupt host files.

New cards
42

worms

Can replicate without any user interaction

New cards
43

Trojan

piece of malicious software that is disguised as a piece of harmless or desirable software

New cards
44

RAT

Remote Access Trojan or Remote Access Tool

New cards
45

Control Node

Computer responsible for managing and coordinating the activities of other nodes or devices within a network

New cards
46

Rootkit

Designed to gain administrative level control over a given computer system without being detected

New cards
47

shim

piece of sofware that is placed between two components and that intercepts the calls between those components and be used to redirect them

New cards
48

Logic Bomb

Malicious code that will only execute if certain conditions have been met

New cards
49

Data Controller

Entity responsible for determining data storage, collection, and usage purposes and methods

New cards
50

data steward

focuses on data quality and metadata, making sure its labeled correctly, usually working under the data owner

New cards
51

data custodian

managing the systems on which data assets are stored, including enforcing access controls, encryption, and backup measures

New cards
52

Privacy Officer

Deals with privacy data, HIPPA, (PII) Personally identifiable information, (SPI) Sensitive personal information, (PHI) Protected health information, ensuring compliance with legal and regulatory frameworks

New cards
53

Block Cipher

Breaks input data into fixed-size blocks before encryption

New cards
54

Symmetric Algorithm

DES (Data Encryption Standard), TRIPLE DES, IDEA, AES, Blowfish, Twofish, RC4, RC5, RC6

New cards
55

Asymmetric Algorithms

Diffie-Hellman- vulnerable to man in the middle attacks

RSA(Ron Rivest, Adi Shamir, Leonard Adleman)

Elliptic Curve Cryptography (ECC) - More efficient than RSA, commonly used on low power computing

New cards
56

Hash based message Authentication Protocol(HMAC)

checks message integrity and authenticity

New cards
57

Nonces

adds unique, often random numbers to password-based authentication processes

New cards
58

Wild Card Certificate

Allows multiple sub domains to use the same certificate

New cards
59

Journaling

The term 'Journaling' is defined as the ability to record all communications for use in the company retention or archiving policy.

New cards
60

SIEM (Security Information and Event Management)

A solution for real-time-or near time analysis of security alerts generated by network hardware and applications

New cards
61

(NAC) Network Access Controller

Used to protect networks from both known and unknown devices by scanning devices to assess their security status before granting access

New cards
62

Dynamic Code Anaylsis

Analyzes applications while they run

New cards
63

Static Code Analysis

A method of debugging and application by reviewing and examining its source code before running the program

New cards
64

Fuzzing

Inputs random data to provoke crashes or exceptions, helps uncover security flaws and weaknesses

New cards
65

Code Signing

confirms the software's author identity and integrity, utilizes digital signatures to verify code authenticity

New cards
66

(EAP) Extensible Authentication Protocol

Authentication framework supporting multiple methods, Provides common functions and negotiation of authentication Protocols

New cards
67

EAP-TTLS (Extensible Authentication Protocol-Tunneled Transport Layer Security)

Extends TLS support across platforms and requires server side certificates for security

New cards
68

(PEAP) Protected Extensible Authentication Protocol

Encapsulates EAP within an encrypted TLS Tunnel

New cards
69

(EAP-FAST)Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling

Uses a protected access credential and TLS tunnel

New cards
70

TLS (Transport Layer Security)

highly effective for ensuring data privacy, it can also have an unintended consequence for cybersecurity. By encrypting internet traffic, TLS not only renders data unreadable; it also does the same for malware and other threats

New cards
71

RADIUS (Remote Authentication Dial-In User Service)

offers authentication, authorization, and accounting services, widely used for secure access to network resources

New cards
72

(TACACS+) Terminal Access Controller Access-Control System Plus

separates authentication, authorization, and accounting functions. More granular control, encrypts the authentication process using TCP for enhanced security

New cards
73

Fault-resistant RAID

Protects against the loss of the array's data if a single disk fails (RAID 1 or RAID 5)

New cards
74

Fault-tolerant RAID

Protects against the loss of the array's data if a single component fails (RAID 1, RAID 5, RAID 6)

New cards
75

Disaster-tolerant RAID

Provides two independent zones with full access to the data (RAID 10)

New cards
76

Data Steward

A role focused on the quality of the data and associated metadata

New cards
77

Memorandum of Understanding (MOU)

A non-binding agreement between two or more organizations to detail an intended common line of action. Often referred to as a letter of intent.

New cards
78

hping

An open-source packet generator and analyzer for the TCP/IP protocol that is used for security auditing and testing of firewalls and networks

New cards
79

netstat

Utility that displays network connections for Transmission Control Protocol, routing tables, and a number of network interface and network protocol statistics

New cards
80

grep

A command-line utility for searching plain-text data sets for lines that match a regular expression or pattern

New cards
81

tracert/traceroute

A network diagnostic command for displaying possible routes and measuring transit delays of packets across an Internet Protocol network

New cards
82

6 Step Incident Response

1. Preparation

2. Identification

3. Containment

4. Eradication

5. Recovery

6. Lessons Learned

New cards
83

ISO 31000

An international standard for enterprise risk management that provides a universally recognized paradigm for practitioners and companies employing risk management processes to replace the myriad of existing standards, methodologies, and paradigms that differed between industries, subject matters, and regions

New cards
84

ISO 27002

An international standard that provides best practice recommendations on information security controls for use by those responsible for initiating, implementing, or maintaining information security management systems (ISMS)

New cards
85

Cybersecurity Framework (CSF)

A set of industry standards and best practices created by NIST to help organizations manage cybersecurity risks

New cards
86

Business Partnership Agreement (BPA)

Conducted between two business partners that establishes the conditions of their relationship. Can also include security requirements.

New cards
87

Interconnection Security Agreement (ISA)

An agreement for the owners and operators of the IT systems to document what technical requirements each organization must meet

New cards
88

Service Level Agreement (SLA)

An agreement concerned with the ability to support and respond to problems within a given timeframe and continuing to provide the agreed upon level of service to the user

New cards
89

Non-Disclosure Agreement (NDA)

Agreement between two parties that defines what data is considered confidential and cannot be shared outside of the relationship

New cards
90

Due Process

A legal term that refers to how an organization must respect and safeguard personnels rights. Protects citizens from their government and companies from lawsuits.

New cards
91

Recovery Time Objective (RTO)

The length of time it takes after an event to resume normal business operations and activities.

New cards
92

Towers of Hanoi

Three sets of backup tapes (like the grandfather-father-son) that are rotated in a more complex system

New cards
93

Internet Key Exchange (IKE)

Method used by IPSec to create a secure tunnel by encrypting the connection between authenticated peers

New cards
94

Layer 2 Tunneling Protocol (L2TP)

A connection between two or more computers or device that are not on the same private network. Usually paired with IPSec to provide security. Uses port 1701.

New cards
95

Secure Sockets Layer (SSL)/Transport Layer Security (TLS)

Cryptographic protocols that provide secure internet communications for web browsing, instant messaging, email, VoIP, and many other services.

New cards
96

Certificate Signing Request (CSR)

A specially formatted encrypted message that validates the information the CA requires to issue a digital certificate.

New cards
97

Which of these protocols use TLS to provide secure communication?

HTTPS, TFPS

New cards
98

You've hired a third-party to gather information about your company's servers and data. The third-party will not have direct access to your internal network but can gather information from any other source. Which of the following would BEST describe this approach?

Passive footprinting

New cards
99

Which of these protocols use TLS to provide secure communication?

HTTPS, FTPS

New cards
100

An IPS at your company has found a sharp increase in traffic from all-in-one printers. After researching, your security team has found a vulnerability associated with these devices that allows the device to be remotely controlled by a third-party. Which category would BEST describe these devices?

MFD (Multifunction Device)

New cards

Explore top notes

note Note
studied byStudied by 1 person
86 days ago
5.0(1)
note Note
studied byStudied by 14 people
761 days ago
5.0(2)
note Note
studied byStudied by 66 people
511 days ago
5.0(1)
note Note
studied byStudied by 14 people
953 days ago
5.0(1)
note Note
studied byStudied by 5 people
926 days ago
4.0(1)
note Note
studied byStudied by 10 people
895 days ago
5.0(1)
note Note
studied byStudied by 11 people
972 days ago
4.5(2)
note Note
studied byStudied by 5237 people
150 days ago
4.4(9)

Explore top flashcards

flashcards Flashcard (28)
studied byStudied by 7 people
662 days ago
5.0(1)
flashcards Flashcard (96)
studied byStudied by 73 people
748 days ago
5.0(5)
flashcards Flashcard (43)
studied byStudied by 3 people
635 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 8 people
789 days ago
5.0(1)
flashcards Flashcard (170)
studied byStudied by 7 people
121 days ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 41 people
97 days ago
5.0(1)
flashcards Flashcard (1000)
studied byStudied by 29 people
852 days ago
4.0(1)
flashcards Flashcard (53)
studied byStudied by 3742 people
709 days ago
4.2(54)
robot