COMPTIA SECURITY + 701 Section 4.0

studied byStudied by 1 person
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 225

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

226 Terms

1

Secure Baselines

(4.1 Apply Common Security Techniques to computing resources) Organizations use this to provide known starting points for systems. Improve the overall security posture of systems.

New cards
2

Three steps of baselines

(4.1 Apply Common Security Techniques to computing resources) Establish an initial baseline configuration - Deploy the baseline - Maintain the baseline

New cards
3

Mobile Devices

(4.1 Apply Common Security Techniques to computing resources) Chapter 5

New cards
4

Workstations

(4.1 Apply Common Security Techniques to computing resources) Chapter 5

New cards
5

Switches

(4.1 Apply Common Security Techniques to computing resources) Chapter 3

New cards
6

Routers

(4.1 Apply Common Security Techniques to computing resources) Chapter 3

New cards
7

Cloud Infrastructure

(4.1 Apply Common Security Techniques to computing resources) Chapter 5

New cards
8

Servers

(4.1 Apply Common Security Techniques to computing resources) Chapter 5

New cards
9

ICS (Industrial Control System)

(4.1 Apply Common Security Techniques to computing resources) Systems within large facilities such as power plants or water treatment facilities.

New cards
10

SCADA (Supervisory Control and data acquisition)

(4.1 Apply Common Security Techniques to computing resources) Controls an ICS by monitoring it and sending it commands.

New cards
11

Embedded Systems

(4.1 Apply Common Security Techniques to computing resources) Any device that has a dedicated function and uses a computer system to perform the function.

New cards
12

RTOS (Real Time Operation System)

(4.1 Apply Common Security Techniques to computing resources) A specialized operating system designed for embedded systems that require precise timing and deterministic behavior.

New cards
13

IoT (Internet of Things) devices

(4.1 Apply Common Security Techniques to computing resources) A wide assortment of technologies that interact with the physical world. Commonly have embedded systems and typically connect to a central device or app and communicate via the internet, Bluetooth, or other wireless technologies.

New cards
14

Wireless Devices

(4.1 Apply Common Security Techniques to computing resources) Chapter 4

New cards
15

Installation considerations

(4.1 Apply Common Security Techniques to computing resources) Chapter 4

New cards
16

Site Surveys

(4.1 Apply Common Security Techniques to computing resources) Examines the wireless environment to identify potential issues, such as areas with noise or other devices operating on the same frequency bands.

New cards
17

Heat Maps

(4.1 Apply Common Security Techniques to computing resources) Give color-coded representation of wireless signals.

New cards
18

Mobile Device Management (MDM)

(4.1 Apply Common Security Techniques to computing resources) Includes the technologies to manage mobile devices. Goal is to ensure these devices have security controls in place to keep them secure.

New cards
19

Deployment Models

(4.1 Apply Common Security Techniques to computing resources) Chapter 5

New cards
20

Bring your own device (BYOD)

(4.1 Apply Common Security Techniques to computing resources) Allows employees to connect their personal devices to the corporate network.

New cards
21

Corporate-owned, personally enabled (COPE)

(4.1 Apply Common Security Techniques to computing resources) Devices are owned by the organization, but employees can use them for personal reasons.

New cards
22

Choose your own device (CYOD)

(4.1 Apply Common Security Techniques to computing resources) Includes a list of approved devices that employees can purchase and connect to the network.

New cards
23

Connection Methods

(4.1 Apply Common Security Techniques to computing resources) Cellular, Wi-Fi, Bluetooth

New cards
24

Wi-Fi Protected Access Chapter 3 (WPA3)

(4.1 Apply Common Security Techniques to computing resources) Devices are now widely available on many enterprise wireless networks.

New cards
25

AAA/Remote Authentication Dial-In User Service (RADIUS)

(4.1 Apply Common Security Techniques to computing resources) Only encrypts the password by default but can be used with EAP to encrypt entire sessions.

New cards
26

Application Security

(4.1 Apply Common Security Techniques to computing resources) Chapter 7

New cards
27

Input Validation

(4.1 Apply Common Security Techniques to computing resources) Practice of checking data for validity before using it. Prevents an attacker from sending malicious code that an application will use by either sanitizing the input to remove malicious code or rejecting the input.

New cards
28

Secure Cookies

(4.1 Apply Common Security Techniques to computing resources) Cookie that has the secure attribute set. Secure attribute ensures that the cookie is only transmitted over secure, encrypted channels, such as HTTPS.

New cards
29

Static Code Analysis

(4.1 Apply Common Security Techniques to computing resources) Examines the code without executing it. Developer goes through the code line by line to discover vulnerabilities.

New cards
30

Code Signing

(4.1 Apply Common Security Techniques to computing resources) 1. The certificate identifies the author. 2. The hash verifies the code has not been modified. If malware changes the code, the hash no longer matches, alerting the user that the code has been modified.

New cards
31

Sandboxing

(4.1 Apply Common Security Techniques to computing resources) Used to test applications within an isolated area specifically created for testing.

New cards
32

Monitoring

(4.1 Apply Common Security Techniques to computing resources) Chapter 7 (362)

New cards
33

Acquisition/Procurement Process

(4.2 Security implications of proper hardware, software, and data asset management) Provides consistent procedures for identifying the need for new assets, evaluating the possible options for security, financial, and business requirements, and effectively onboarding and managing new vendors.

New cards
34

Assignment/Accounting

(4.2 Security implications of proper hardware, software, and data asset management) Assigns each asset to a named owner who bears responsibility for the asset and a classification system that identifies the sensitivity and criticality of each asset to the organization.

New cards
35

Monitoring/asset tracking

(4.2 Security implications of proper hardware, software, and data asset management) Maintains an inventory of all of the assets owned by the organization and their current location. It also benefits from periodic enumeration of assets, where auditors review the assets owned by the organization and update the inventory.

New cards
36

Disposal/decommissioning

(4.2 Security implications of proper hardware, software, and data asset management) Chapter 11

New cards
37

Sanitization

(4.2 Security implications of proper hardware, software, and data asset management) Ensure that data is removed or destroyed from any devices before disposing of the devices.

New cards
38

Destruction

(4.2 Security implications of proper hardware, software, and data asset management) Chapter 11

New cards
39

Certification

(4.2 Security implications of proper hardware, software, and data asset management) Certificate of Destruction (COD) that the destruction was properly carried out.

New cards
40

Data Retention

(4.2 Security implications of proper hardware, software, and data asset management) Identifies how long data is retained, and sometimes specifies where it is stored.

New cards
41

Vulnerability Scan

(4.3 Various activities associated with vulnerability Management) Chapter 8

New cards
42

Application Security

4.3 Various activities associated with vulnerability Management) Chapter 11

New cards
43

Static Analysis

4.3 Various activities associated with vulnerability Management) Chapter 11

New cards
44

Dynamic Analysis

4.3 Various activities associated with vulnerability Management) Chapter 11

New cards
45

Package Monitoring

4.3 Various activities associated with vulnerability Management) Chapter 11

New cards
46

Open-Source Intelligence (OSINT)

(4.3 Various activities associated with vulnerability Management) Includes any information that is available to the general public, such as via websites and social media.

New cards
47

Proprietary/Third-party

(4.3 Various activities associated with vulnerability Management) Trade Secrets such as intellectual property

New cards
48

Information-sharing Organization

4.3 Various activities associated with vulnerability Management) Chapter 6

New cards
49

Dark Web

4.3 Various activities associated with vulnerability Management) Chapter 6

New cards
50

Penetration Testing

4.3 Various activities associated with vulnerability Management) Actively assesses deployed security controls within a system or network.

New cards
51

Responsible Disclosure (RD) Program

(4.3 Various activities associated with Vulnerability Management) The goal is to address security issues before they are exploited by attackers, improving overall security for everyone. Involve a coordinated process for reporting vulnerabilities to the appropriate parties, such as vendors, developers, or security teams. Includes guidelines for reporting vulnerabilities, a point of contact for reporting, and expectations for the timeline of the response and resolution. When vulnerabilities are reported, the organization receiving the report is expected to investigate and, if necessary, take appropriate steps to address the issue.

New cards
52

Bug Bounty Program

(4.3 Various activities associated with vulnerability Management) Type of responsible disclosure program that incentivizes individuals or organizations to report vulnerabilities by offering monetary or other rewards for valid submissions. Can be run by organizations to encourage external researchers or open to the public, while others are by invitation only.

New cards
53

System/Process Audit

(4.3 Various activities associated with vulnerability Management) Chapter 8 (Page 412)

New cards
54

Analysis

(4.3 Various activities associated with vulnerability Management) Chapter 8

New cards
55

Confirmation

(4.3 Various activities associated with vulnerability Management) Chapter 8

New cards
56

False Positive

(4.3 Various activities associated with vulnerability Management) A vulnerability scanner incorrectly reports that a vulnerability exists, but the vulnerability does not exist on the scanned system.

New cards
57

False Negative

(4.3 Various activities associated with vulnerability Management) A vulnerability exists, but the scanner doesn’t detect it and doesn’t report the vulnerability.

New cards
58

Prioritize

(4.3 Various activities associated with vulnerability Management) Chapter 8

New cards
59

Common Vulnerability Scoring System (CVSS)

(4.3 Various activities associated with Vulnerability Management) Assesses vulnerabilities and assigns severity scores from 0 to 10, with 10 being the most severe. Helps security professionals prioritize their work in mitigating known vulnerabilities.

New cards
60

Common Vulnerability Enumeration (CVE)

(4.3 Various activities associated with vulnerability Management) A dictionary of publicly known security vulnerabilities and exposures.

New cards
61

Vulnerability Classification

(4.3 Various activities associated with vulnerability Management) Chapter 8

New cards
62

Exposure Factor

(4.3 Various activities associated with vulnerability Management) Chapter 8

New cards
63

Environmental Variables

(4.3 Various activities associated with vulnerability Management) Chapter 8

New cards
64

Industry/organizational impact

(4.3 Various activities associated with vulnerability Management) Chapter 8

New cards
65

Risk Tolerance

(4.3 Various activities associated with vulnerability Management) The organization’s ability to withstand risk.

New cards
66

Vulnerability Response and Remediation

(4.3 Various activities associated with vulnerability Management) Chapter 8

New cards
67

Patching

(4.3 Various activities associated with vulnerability Management) Updating the correct vulnerabilities and other flaws in the applicaiton.

New cards
68

Insurance

(4.3 Various activities associated with vulnerability Management) Chapter 8

New cards
69

Segmentation

(4.3 Various activities associated with vulnerability Management) Chapter 8

New cards
70

Compensating Controls

(4.3 Various activities associated with vulnerability Management) Secondary security control that prevents the vulnerability from being exploited.

New cards
71

Exceptions and Exemptions

(4.3 Various activities associated with vulnerability Management) Chapter 8

New cards
72

Validation of Remediation

(4.3 Various activities associated with vulnerability Management) Chapter 8

New cards
73

Rescanning

(4.3 Various activities associated with vulnerability Management) Chapter 8

New cards
74

Audit

(4.3 Various activities associated with vulnerability Management) A formal evaluation of an organization’s policies, procedures, and operations.

New cards
75

Verification

(4.3 Various activities associated with vulnerability Management) Chapter 8

New cards
76

Reporting

(4.3 Various activities associated with vulnerability Management) Chapter 8

New cards
77

Systems

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 1

New cards
78

Applications

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 1

New cards
79

Infrastructure

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 1

New cards
80

Activities

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 1

New cards
81

Log Aggregation

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 1

New cards
82

Alerting

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 1

New cards
83

Scanning

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 1

New cards
84

Reporting

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 1

New cards
85

Archiving

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 1

New cards
86

Alert Response and remediation/validation

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 4

New cards
87

Quarantine

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 4

New cards
88

Alert Tuning

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 1

New cards
89

Security Content Automation Protocol (SCAP)

(4.4 Alerting and Monitoring Concepts and Tools) Designed to help facilitate communication between vulnerability scanners and other security and management tools.

New cards
90

Benchmarks

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 8

New cards
91

Agent NAC

(4.4 Alerting and Monitoring Concepts and Tools) Can be either permanent or dissolvable. A permanent is installed on the client and stays on the client. NAC uses the agent when the client attempts to log on remotely. A dissolvable is downloaded and runs on the client when the client logs on remotely. It collects the information it needs, identifies the client as healthy or not healthy, and reports the status back to the NAC System.

New cards
92

Agentless NAC

(4.4 Alerting and Monitoring Concepts and Tools) Scans a client remotely without installing code on the client, either permanently or temporarily.

New cards
93

Security Information and event management (SIEM)

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 1

New cards
94

Antivirus

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 5

New cards
95

Data Loss Prevention (DLP)

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 5

New cards
96

Simple Network Management Protocol (SNMP)

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 3

New cards
97

NetFlow

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 8

New cards
98

Vulnerability Scanners

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 8

New cards
99

Firewall

(4.5 Modify Enterprise Capabilities to enhance security) Chapter 3

New cards
100

Rules

(4.5 Modify Enterprise Capabilities to enhance security) Chapter 3

New cards

Explore top notes

note Note
studied byStudied by 1 person
86 days ago
5.0(1)
note Note
studied byStudied by 14 people
761 days ago
5.0(2)
note Note
studied byStudied by 66 people
511 days ago
5.0(1)
note Note
studied byStudied by 14 people
953 days ago
5.0(1)
note Note
studied byStudied by 5 people
926 days ago
4.0(1)
note Note
studied byStudied by 10 people
895 days ago
5.0(1)
note Note
studied byStudied by 11 people
972 days ago
4.5(2)
note Note
studied byStudied by 5237 people
150 days ago
4.4(9)

Explore top flashcards

flashcards Flashcard (28)
studied byStudied by 7 people
662 days ago
5.0(1)
flashcards Flashcard (96)
studied byStudied by 73 people
748 days ago
5.0(5)
flashcards Flashcard (43)
studied byStudied by 3 people
635 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 8 people
789 days ago
5.0(1)
flashcards Flashcard (170)
studied byStudied by 7 people
121 days ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 41 people
97 days ago
5.0(1)
flashcards Flashcard (1000)
studied byStudied by 29 people
852 days ago
4.0(1)
flashcards Flashcard (53)
studied byStudied by 3742 people
709 days ago
4.2(54)
robot