CompTIA Security+ Review Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/60

flashcard set

Earn XP

Description and Tags

These flashcards cover key CompTIA Security+ concepts found throughout the lecture transcript, focusing on threats, controls, encryption, incident response, risk management, network design, and security best practices.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

61 Terms

1
New cards

Which threat actor is most likely sponsored by a government to attack another nation’s critical infrastructure?

A nation-state actor

2
New cards

What security process adds random data to a password before hashing it to defeat pre-computed attacks?

Salting

3
New cards

Clicking an email link that leads to a fake payment site designed to steal credentials is an example of what attack?

Phishing

4
New cards

Which jump-off device should administrators use when direct access to a protected network segment is blocked?

A jump server (bastion host)

5
New cards

What appliance sits in front of web servers to block attacks such as SQL injection or buffer overflows?

Web Application Firewall (WAF)

6
New cards

Adding a second factor such as an authenticator app to logins is an example of which control?

Multifactor authentication (MFA)

7
New cards

A text message that tricks users into entering payroll credentials is which two social-engineering techniques?

Smishing and impersonation

8
New cards

An email that appears to come from the CEO asking for gift cards is most likely what attack type?

Business Email Compromise (BEC)

9
New cards

Which best mitigates the risk of buying counterfeit network gear?

Thorough supply-chain analysis

10
New cards

What document spells out scope, tools, and boundaries for a third-party penetration test?

Rules of Engagement (RoE)

11
New cards

Running a port scan that actively sends packets to the target is what kind of reconnaissance?

Active reconnaissance

12
New cards

Which plan outlines steps to restore systems after a disaster?

Disaster Recovery Plan (DRP)

13
New cards

Installing apps outside an official mobile store is known as what vulnerability?

Sideloading

14
New cards

Trying one common password against many accounts is called?

Password spraying

15
New cards

In Zero-Trust networking, dividing the environment to reduce lateral movement is called?

Threat-scope reduction (micro-segmentation)

16
New cards

What URL pattern could a web filter block to deny non-encrypted sites?

"http://"

17
New cards

To block a single IP from entering the network, which ACL action is required?

Inbound deny with the attacker’s IP as the source

18
New cards

Which hardened host on the perimeter provides admin access while limiting traffic?

Bastion / jump host

19
New cards

To learn what program ran on a compromised laptop, which log source is most useful?

Endpoint (host) logs

20
New cards

Proactively searching logs for new attacker TTPs before alerts exist is called?

Threat hunting

21
New cards

Buying cyber-insurance to cover breaches illustrates which risk strategy?

Risk transfer

22
New cards

Encrypting an entire laptop drive is known as what technique?

Full-disk encryption (FDE)

23
New cards

An Acceptable-Use Policy is which type of control?

Preventive (administrative) control

24
New cards

Limiting help-desk console access to the manager and lead enforces which principle?

Principle of Least Privilege

25
New cards

What document lists risks, owners, and thresholds for action?

Risk register

26
New cards

Before deploying new firewall rules, what procedural step is mandatory?

Submit and follow a change-management procedure

27
New cards

Paying researchers for responsibly disclosed vulnerabilities is called a?

Bug bounty program

28
New cards

Using a form field to run DB commands illustrates which attack?

SQL injection

29
New cards

Design files and formulas used daily by R&D staff are classified as what data type?

Intellectual property

30
New cards

Asset tags tied to employee IDs help security teams do what two things?

1) Notify the correct user after an incident; 2) Account for company data when the employee departs

31
New cards

Updating the content of mandatory recurring training helps improve what?

User situational and environmental awareness

32
New cards

A one-page visual showing quarterly incident counts for executives is best delivered via?

A security dashboard

33
New cards

A changed hash on cmd.exe without recent patches likely indicates what malware?

A rootkit

34
New cards

In IaaS, who is responsible for securing the database running on a VM?

The client / customer

35
New cards

A document describing project scope, cost, and time line is a?

Statement of Work (SOW)

36
New cards

Validating and sanitising input to stop XSS should be done via which technique?

Input validation

37
New cards

Two key design factors for high-availability networks are?

Ease of recovery and minimizing attack surface

38
New cards

What should be done first before applying a high-priority patch to production?

Create and approve a change-control request

39
New cards

Why perform root-cause analysis after an incident?

To prevent future incidents of the same nature

40
New cards

Failing an internal PCI-DSS assessment most often results in?

Fines from card brands

41
New cards

Calculating minimum staff needed for continuity after a disaster is called?

Capacity planning

42
New cards

Blocking document access based on the user’s country is enforced with?

A geolocation policy

43
New cards

Using outdated router firmware represents which vulnerability type?

Hardware-specific (firmware version) vulnerability

44
New cards

Preventing unknown programs from running is best achieved with?

An application allow-list

45
New cards

A consultant hired to perform pentesting & social engineering is part of what team?

Red team

46
New cards

Digitally signing internally developed code ensures what property?

Authenticity (code signing)

47
New cards

A decoy server that lures attackers without touching production is a?

Honeypot

48
New cards

Determining root cause and scope of an incident occurs in which IR phase?

Analysis

49
New cards

After vulnerabilities are fixed, what should occur next?

Rescan the environment to verify remediation

50
New cards

Copying large data to a personal device after hours exemplifies what threat?

Malicious insider threat

51
New cards

Digital signatures that prove a sender cannot deny sending provide what?

Non-repudiation

52
New cards

Daily automated checks for changed server settings exemplify what?

Configuration-compliance automation

53
New cards

Which tool alerts when PII is emailed outside the company?

Data Loss Prevention (DLP) solution

54
New cards

A legal hold following a breach requires what action?

Retain all communications related to the breach until further notice

55
New cards

Password + hardware token + thumbprint fulfils what requirement?

MFA using something you know, have, and are

56
New cards

After writing new incident documents, what activity validates them?

Conduct a tabletop exercise

57
New cards

Users blocked from a retail site mis-categorized as gambling need what fix?

Update the content-filter categorization

58
New cards

Automatically disabling accounts of departing staff is an example of what automation use case?

Disabling access / de-provisioning

59
New cards

Showing only the last four digits of a credit card uses which data-security method?

Data masking

60
New cards

Files renamed with a .ryk extension and ransom note indicate what malware?

Ransomware (Ryuk variant)

61
New cards

For an emergency-reporting health-care web app, which design attribute is paramount?

Availability