COMPTIA SECURITY + 701 Section 4.0

0.0(0)
studied byStudied by 6 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/212

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

213 Terms

1
New cards

Secure Baselines

(4.1 Apply Common Security Techniques to computing resources) Organizations use this to provide known starting points for systems. Improve the overall security posture of systems.

2
New cards

Three steps of baselines

(4.1 Apply Common Security Techniques to computing resources) Establish an initial baseline configuration - Deploy the baseline - Maintain the baseline

3
New cards

Mobile Devices

(4.1 Apply Common Security Techniques to computing resources) Chapter 5

4
New cards

Workstations

(4.1 Apply Common Security Techniques to computing resources) Chapter 5

5
New cards

Switches

(4.1 Apply Common Security Techniques to computing resources) Chapter 3

6
New cards

Routers

(4.1 Apply Common Security Techniques to computing resources) Chapter 3

7
New cards

Cloud Infrastructure

(4.1 Apply Common Security Techniques to computing resources) Chapter 5

8
New cards

Servers

(4.1 Apply Common Security Techniques to computing resources) Chapter 5

9
New cards

ICS (Industrial Control System)

(4.1 Apply Common Security Techniques to computing resources) Systems within large facilities such as power plants or water treatment facilities.

10
New cards

SCADA (Supervisory Control and data acquisition)

(4.1 Apply Common Security Techniques to computing resources) Controls an ICS by monitoring it and sending it commands.

11
New cards

Embedded Systems

(4.1 Apply Common Security Techniques to computing resources) Any device that has a dedicated function and uses a computer system to perform the function.

12
New cards

RTOS (Real Time Operation System)

(4.1 Apply Common Security Techniques to computing resources) A specialized operating system designed for embedded systems that require precise timing and deterministic behavior.

13
New cards

IoT (Internet of Things) devices

(4.1 Apply Common Security Techniques to computing resources) A wide assortment of technologies that interact with the physical world. Commonly have embedded systems and typically connect to a central device or app and communicate via the internet, Bluetooth, or other wireless technologies.

14
New cards

Wireless Devices

(4.1 Apply Common Security Techniques to computing resources) Chapter 4

15
New cards

Installation considerations

(4.1 Apply Common Security Techniques to computing resources) Chapter 4

16
New cards

Site Surveys

(4.1 Apply Common Security Techniques to computing resources) Examines the wireless environment to identify potential issues, such as areas with noise or other devices operating on the same frequency bands.

17
New cards

Heat Maps

(4.1 Apply Common Security Techniques to computing resources) Give color-coded representation of wireless signals.

18
New cards

Mobile Device Management (MDM)

(4.1 Apply Common Security Techniques to computing resources) Includes the technologies to manage mobile devices. Goal is to ensure these devices have security controls in place to keep them secure.

19
New cards

Deployment Models

(4.1 Apply Common Security Techniques to computing resources) Chapter 5

20
New cards

Bring your own device (BYOD)

(4.1 Apply Common Security Techniques to computing resources) Allows employees to connect their personal devices to the corporate network.

21
New cards

Corporate-owned, personally enabled (COPE)

(4.1 Apply Common Security Techniques to computing resources) Devices are owned by the organization, but employees can use them for personal reasons.

22
New cards

Choose your own device (CYOD)

(4.1 Apply Common Security Techniques to computing resources) Includes a list of approved devices that employees can purchase and connect to the network.

23
New cards

Connection Methods

(4.1 Apply Common Security Techniques to computing resources) Cellular, Wi-Fi, Bluetooth

24
New cards

Wi-Fi Protected Access Chapter 3 (WPA3)

(4.1 Apply Common Security Techniques to computing resources) Devices are now widely available on many enterprise wireless networks.

25
New cards

AAA/Remote Authentication Dial-In User Service (RADIUS)

(4.1 Apply Common Security Techniques to computing resources) Only encrypts the password by default but can be used with EAP to encrypt entire sessions.

26
New cards

Application Security

(4.1 Apply Common Security Techniques to computing resources) Chapter 7

27
New cards

Input Validation

(4.1 Apply Common Security Techniques to computing resources) Practice of checking data for validity before using it. Prevents an attacker from sending malicious code that an application will use by either sanitizing the input to remove malicious code or rejecting the input.

28
New cards

Secure Cookies

(4.1 Apply Common Security Techniques to computing resources) Cookie that has the secure attribute set. Secure attribute ensures that the cookie is only transmitted over secure, encrypted channels, such as HTTPS.

29
New cards

Static Code Analysis

(4.1 Apply Common Security Techniques to computing resources) Examines the code without executing it. Developer goes through the code line by line to discover vulnerabilities.

30
New cards

Code Signing

(4.1 Apply Common Security Techniques to computing resources) 1. The certificate identifies the author. 2. The hash verifies the code has not been modified. If malware changes the code, the hash no longer matches, alerting the user that the code has been modified.

31
New cards

Sandboxing

(4.1 Apply Common Security Techniques to computing resources) Used to test applications within an isolated area specifically created for testing.

32
New cards

Monitoring

(4.1 Apply Common Security Techniques to computing resources) Chapter 7 (362)

33
New cards

Acquisition/Procurement Process

(4.2 Security implications of proper hardware, software, and data asset management) Provides consistent procedures for identifying the need for new assets, evaluating the possible options for security, financial, and business requirements, and effectively onboarding and managing new vendors.

34
New cards

Assignment/Accounting

(4.2 Security implications of proper hardware, software, and data asset management) Assigns each asset to a named owner who bears responsibility for the asset and a classification system that identifies the sensitivity and criticality of each asset to the organization.

35
New cards

Monitoring/asset tracking

(4.2 Security implications of proper hardware, software, and data asset management) Maintains an inventory of all of the assets owned by the organization and their current location. It also benefits from periodic enumeration of assets, where auditors review the assets owned by the organization and update the inventory.

36
New cards

Disposal/decommissioning

(4.2 Security implications of proper hardware, software, and data asset management) Retiring software that is no longer in use. It involves wiping all data from the device, including temporary files and backups, and removing all access credentials and software licenses associated with the device. Hardware must be physically destroyed or securely disposed of to prevent it from being reused or repurposed without proper clearance.

37
New cards

Sanitization

(4.2 Security implications of proper hardware, software, and data asset management) Ensure that data is removed or destroyed from any devices before disposing of the devices.

38
New cards

Destruction

(4.2 Security implications of proper hardware, software, and data asset management) Chapter 11

39
New cards

Certification

(4.2 Security implications of proper hardware, software, and data asset management) Certificate of Destruction (COD) that the destruction was properly carried out.

40
New cards

Data Retention

(4.2 Security implications of proper hardware, software, and data asset management) Identifies how long data is retained, and sometimes specifies where it is stored.

41
New cards

Vulnerability Scan

(4.3 Various activities associated with vulnerability Management) Chapter 8

42
New cards

Application Security

4.3 Various activities associated with vulnerability Management) Chapter 7

43
New cards

Static Analysis

4.3 Various activities associated with vulnerability Management) Examines the code without executing it.

44
New cards

Dynamic Analysis

4.3 Various activities associated with vulnerability Management) Checks the code as it is running.

45
New cards

Package Monitoring

4.3 Various activities associated with vulnerability Management) Chapter 11

46
New cards

Open-Source Intelligence (OSINT)

(4.3 Various activities associated with vulnerability Management) Includes any information that is available to the general public, such as via websites and social media.

47
New cards

Proprietary/Third-party

(4.3 Various activities associated with vulnerability Management) Trade Secrets such as intellectual property

48
New cards

Penetration Testing

4.3 Various activities associated with vulnerability Management) Actively assesses deployed security controls within a system or network.

49
New cards

Responsible Disclosure (RD) Program

(4.3 Various activities associated with Vulnerability Management) The goal is to address security issues before they are exploited by attackers, improving overall security for everyone. Involve a coordinated process for reporting vulnerabilities to the appropriate parties, such as vendors, developers, or security teams. Includes guidelines for reporting vulnerabilities, a point of contact for reporting, and expectations for the timeline of the response and resolution. When vulnerabilities are reported, the organization receiving the report is expected to investigate and, if necessary, take appropriate steps to address the issue.

50
New cards

Bug Bounty Program

(4.3 Various activities associated with vulnerability Management) Type of responsible disclosure program that incentivizes individuals or organizations to report vulnerabilities by offering monetary or other rewards for valid submissions. Can be run by organizations to encourage external researchers or open to the public, while others are by invitation only.

51
New cards

System/Process Audit

(4.3 Various activities associated with vulnerability Management) Chapter 8 (Page 412)

52
New cards

Analysis

(4.3 Various activities associated with vulnerability Management) Chapter 8

53
New cards

Confirmation

(4.3 Various activities associated with vulnerability Management) Chapter 8

54
New cards

False Positive

(4.3 Various activities associated with vulnerability Management) A vulnerability scanner incorrectly reports that a vulnerability exists, but the vulnerability does not exist on the scanned system.

55
New cards

False Negative

(4.3 Various activities associated with vulnerability Management) A vulnerability exists, but the scanner doesn’t detect it and doesn’t report the vulnerability.

56
New cards

Common Vulnerability Scoring System (CVSS)

(4.3 Various activities associated with Vulnerability Management) Assesses vulnerabilities and assigns severity scores from 0 to 10, with 10 being the most severe. Helps security professionals prioritize their work in mitigating known vulnerabilities.

57
New cards

Common Vulnerability Enumeration (CVE)

(4.3 Various activities associated with vulnerability Management) A dictionary of publicly known security vulnerabilities and exposures.

58
New cards

Exposure Factor

(4.3 Various activities associated with vulnerability Management) Chapter 8

59
New cards

Risk Tolerance

(4.3 Various activities associated with vulnerability Management) The organization’s ability to withstand risk.

60
New cards

Vulnerability Response and Remediation

(4.3 Various activities associated with vulnerability Management) Chapter 8

61
New cards

Patching

(4.3 Various activities associated with vulnerability Management) Updating the correct vulnerabilities and other flaws in the applicaiton.

62
New cards

Insurance

(4.3 Various activities associated with vulnerability Management) Chapter 8

63
New cards

Segmentation

(4.3 Various activities associated with vulnerability Management) Places the system on an isolated network. Reduces the ability of outsiders to reach the system, minimizing the risk of a compromise.

64
New cards

Compensating Controls

(4.3 Various activities associated with vulnerability Management) Secondary security control that prevents the vulnerability from being exploited.

65
New cards

Audit

(4.3 Various activities associated with vulnerability Management) A formal evaluation of an organization’s policies, procedures, and operations.

66
New cards

Verification

(4.3 Various activities associated with vulnerability Management) Chapter 8

67
New cards

Reporting

(4.3 Various activities associated with vulnerability Management) Chapter 8

68
New cards

Activities

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 1

69
New cards

Log Aggregation

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 1

70
New cards

Alerting

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 1

71
New cards

Scanning

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 1

72
New cards

Reporting

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 1

73
New cards

Archiving

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 1

74
New cards

Alert Response and remediation/validation

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 4

75
New cards

Quarantine

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 4

76
New cards

Alert Tuning

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 1

77
New cards

Security Content Automation Protocol (SCAP)

(4.4 Alerting and Monitoring Concepts and Tools) Designed to help facilitate communication between vulnerability scanners and other security and management tools.

78
New cards

Benchmarks

(4.4 Alerting and Monitoring Concepts and Tools) Chapter 8

79
New cards

Agent NAC

(4.4 Alerting and Monitoring Concepts and Tools) Can be either permanent or dissolvable. A permanent is installed on the client and stays on the client. NAC uses the agent when the client attempts to log on remotely. A dissolvable is downloaded and runs on the client when the client logs on remotely. It collects the information it needs, identifies the client as healthy or not healthy, and reports the status back to the NAC System.

80
New cards

Agentless NAC

(4.4 Alerting and Monitoring Concepts and Tools) Scans a client remotely without installing code on the client, either permanently or temporarily.

81
New cards

Security Information and event management (SIEM)

(4.4 Alerting and Monitoring Concepts and Tools) Provides a centralized solution for collecting, analyzing, and managing data from systems, applications, and infrastructure devices.

82
New cards

Antivirus Software

(4.4 Alerting and Monitoring Concepts and Tools) Scans endpoints for the presence of viruses, worms, Trojan horses, and other malicious code.

83
New cards

Data Loss Prevention (DLP)

(4.4 Alerting and Monitoring Concepts and Tools) Can block the use of USB devices to prevent data loss and monitor outgoing network traffic for unauthorized data transfers.

84
New cards

Simple Network Management Protocol (SNMP)

(4.4 Alerting and Monitoring Concepts and Tools) Monitors and manages network devices, such as routers or switches. Includes modifying the devices’ configuration or having network devices report status back to the central network management system.

85
New cards

NetFlow

(4.4 Alerting and Monitoring Concepts and Tools) A feature available on many routers and switches that can collect IP traffic statistics and send them to a (Blank) collector. Receives the data and stores it, and analysis software on the (Black) collector allows administrators to view and analyze the network activity.

86
New cards

Vulnerability Scanners

(4.4 Alerting and Monitoring Concepts and Tools) Can identify vulnerabilities, misconfigured systems, and the lack of security controls such as up-to-date patches.

87
New cards

Firewall

(4.5 Modify Enterprise Capabilities to enhance security) Filters incoming and outgoing traffic for a single host or between networks. In other words, a firewall can ensure only specific types of traffic are allowed into a network or host, and only specific types of traffic are allowed out of a network or host.

88
New cards

Rules

(4.5 Modify Enterprise Capabilities to enhance security) Chapter 3

89
New cards

Access Lists

(4.5 Modify Enterprise Capabilities to enhance security) Rules implemented on routers (and on Firewalls) to identify what traffic is allowed and what traffic is denied.

90
New cards

Ports/Protocols

(4.5 Modify Enterprise Capabilities to enhance security) Chapter 3

91
New cards

Screened Subnets

(4.5 Modify Enterprise Capabilities to enhance security) Also known as a demilitarized zone (DMZ), is a security zone between a private network and the internet.

92
New cards

IPS

(4.5 Modify Enterprise Capabilities to enhance security) A preventive control. It is placed in-line with traffic. Can actively monitor data streams, detect malicious content, and stop attacks in progress.

93
New cards

Trend-Based IDSs

(4.5 Modify Enterprise Capabilities to enhance security) (sometimes called anomaly detection) Can detect unusual activity. Start with a performance baseline of normal behavior and then compare network traffic against the baseline.

94
New cards

Signature-based IDSs

(4.5 Modify Enterprise Capabilities to enhance security) (sometimes called definition-based) Identifies issues based on known attacks or vulnerabilities. Can detect known attack types.

95
New cards

Web Filters

(4.5 Modify Enterprise Capabilities to enhance security) Chapter 3

96
New cards

Agent-based

(4.5 Modify Enterprise Capabilities to enhance security) Where the filter resides on each user’s computer.

97
New cards

Centralized Proxy

(4.5 Modify Enterprise Capabilities to enhance security) Sit on the network in a strategic location where they can intercept and analyze user requests.

98
New cards

Universal Resource Locator (URL) Scanning

(4.5 Modify Enterprise Capabilities to enhance security) Chapter 3

99
New cards

Content Categorization

(4.5 Modify Enterprise Capabilities to enhance security) Chapter 3

100
New cards

Block Rules

(4.5 Modify Enterprise Capabilities to enhance security) Chapter 3