CompTIA Security+ 701 Study Guide

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/129

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

130 Terms

1
New cards

CIA triad (Confidentiality, Integrity, Availability)

2
New cards

AAA Of Security

Authentication, Authorization, and Accounting

3
New cards

Checksums

Method to verify the integrity of data during transmission

4
New cards

Digital Signatures

Ensure Both Integrity of data during transaction

5
New cards

Server Redundancy

Involves using multiple servers in a load balanced or failover configuration so that if one is overloaded or fails, the other servers can take over the load to continue supporting your end users

6
New cards

Network Redundancy

Ensures that if one network path fails, the data can travel through another route

7
New cards

data redundancy

involves storing data in multiple places

8
New cards

Power Redundancy

involves using backup power sources, like generators and ups systems

9
New cards

Non-repudiation

provides undeniable proof in the world of digital transactions. Cant deny participation or authenticity of their actions

10
New cards

Syslog servers

used to aggregate logs from various network devices and systems so that system administrators can analyze them to detect patterns or anomalies in the organizations systems

11
New cards

Technical Controls

"technology", hardware, and software mechanisms that are implemented to manage and reduce risks

12
New cards

Managerial Controls

("Managing" things) also referred to administrative controls, involve the strategic planning and governance side of security

13
New cards

Operational Controls

Procedures and measures that are designed to protect data on a day to day basis. Are mainly governed by internal processes and human actions

14
New cards

Preventive

Proactive measures implemented to thwart potentical security threats or breaches

15
New cards

Deterrent Controls

Discourage potential attackers by making the effort seem less appealing or more challenging

16
New cards

Detective Controls

(detect) Monitor and alert organizations to malicious activities as they occur

17
New cards

Corrective Controls

Mitigate any potential damage and restore our systems to their normal state

18
New cards

Compensating Controls

Alternative measures that are implemented when primary security controls are not feasible or effective

19
New cards

Directive Controls

Guide, inform, or mandate actions. Often rooted in Policy.

20
New cards

gap analysis

Process of evaluating the differences between an organizations current performance and its desired performance

21
New cards

Zero Trust

Demands verification for every device, user, and transaction with the network

22
New cards

Data plane

Ensures policies are properly executed

23
New cards

honeypot

decoy systems to attract and deceive attackers

24
New cards

honeynets

network of decoy systems for observing complex attacks

25
New cards

honeyfiles

decoy files to detect unauthorized access or data breaches

26
New cards

(APT) Advanced Persistent Threat

Nation-state actor because of their long term persistence and stealth

27
New cards

Threat Vector

Means or pathway by which an attacker can gain unauthorized access to a computer or network

28
New cards

Vishing

Voice Phishing

29
New cards

(MDM) Mobile device management

Manages Phones, remote wipe, geolocation, installs certain apps Ex) jampf

30
New cards

Smishing

SMS phishing

31
New cards

Unsecure networks Vulnerabilities

MAC Address cloning, VLAN Hopping

32
New cards

Vulnerability in Bluetooth protocol

Blueborne -- vulnerabilities in bluetooth technology that can allow can attacher to take over devices

BlueSmack -- type of DoS attack that targets bluetooth enabled devices

33
New cards

Vestibules

Double-door System electronically controlled to allow only one door open at a time, prevents piggybacking

34
New cards

Bollards

short vertical posts, typically made of steel. In front of government buildings alot

35
New cards

Microwave Sensors

detect movement in an area by emitting microwave pulses and measuring their reflection off moving objects

36
New cards

Ultrasonic sensors

Measures the reflection of ultrasonic waves off moving objects

37
New cards

Piggy backing

Involves two people working together with one person who has legitimate access intentionally allows another person who doesnt have proper authorization to enter a secure area with them

38
New cards

Cipher locks

mechanical locks with numbers push buttons, requires a correct combination to open

39
New cards

Typosquating

URL Hijacking,, hoping somebody puts in the wrong url and goes to your cloned website

40
New cards

Watering hole

Hackers take over a specific website that is normally frequented by a person or company

41
New cards

Viruses

attach to clean files, (spread), and corrupt host files.

42
New cards

worms

Can replicate without any user interaction

43
New cards

Trojan

piece of malicious software that is disguised as a piece of harmless or desirable software

44
New cards

RAT

Remote Access Trojan or Remote Access Tool

45
New cards

Control Node

Computer responsible for managing and coordinating the activities of other nodes or devices within a network

46
New cards

Rootkit

Designed to gain administrative level control over a given computer system without being detected

47
New cards

shim

piece of sofware that is placed between two components and that intercepts the calls between those components and be used to redirect them

48
New cards

Logic Bomb

Malicious code that will only execute if certain conditions have been met

49
New cards

Data Controller

Entity responsible for determining data storage, collection, and usage purposes and methods

50
New cards

data steward

focuses on data quality and metadata, making sure its labeled correctly, usually working under the data owner

51
New cards

data custodian

managing the systems on which data assets are stored, including enforcing access controls, encryption, and backup measures

52
New cards

Privacy Officer

Deals with privacy data, HIPPA, (PII) Personally identifiable information, (SPI) Sensitive personal information, (PHI) Protected health information, ensuring compliance with legal and regulatory frameworks

53
New cards

Block Cipher

Breaks input data into fixed-size blocks before encryption

54
New cards

Symmetric Algorithm

DES (Data Encryption Standard), TRIPLE DES, IDEA, AES, Blowfish, Twofish, RC4, RC5, RC6

55
New cards

Asymmetric Algorithms

Diffie-Hellman- vulnerable to man in the middle attacks

RSA(Ron Rivest, Adi Shamir, Leonard Adleman)

Elliptic Curve Cryptography (ECC) - More efficient than RSA, commonly used on low power computing

56
New cards

Hash based message Authentication Protocol(HMAC)

checks message integrity and authenticity

57
New cards

Nonces

adds unique, often random numbers to password-based authentication processes

58
New cards

Wild Card Certificate

Allows multiple sub domains to use the same certificate

59
New cards

Journaling

The term 'Journaling' is defined as the ability to record all communications for use in the company retention or archiving policy.

60
New cards

SIEM (Security Information and Event Management)

A solution for real-time-or near time analysis of security alerts generated by network hardware and applications

61
New cards

(NAC) Network Access Controller

Used to protect networks from both known and unknown devices by scanning devices to assess their security status before granting access

62
New cards

Dynamic Code Anaylsis

Analyzes applications while they run

63
New cards

Static Code Analysis

A method of debugging and application by reviewing and examining its source code before running the program

64
New cards

Fuzzing

Inputs random data to provoke crashes or exceptions, helps uncover security flaws and weaknesses

65
New cards

Code Signing

confirms the software's author identity and integrity, utilizes digital signatures to verify code authenticity

66
New cards

(EAP) Extensible Authentication Protocol

Authentication framework supporting multiple methods, Provides common functions and negotiation of authentication Protocols

67
New cards

EAP-TTLS (Extensible Authentication Protocol-Tunneled Transport Layer Security)

Extends TLS support across platforms and requires server side certificates for security

68
New cards

(PEAP) Protected Extensible Authentication Protocol

Encapsulates EAP within an encrypted TLS Tunnel

69
New cards

(EAP-FAST)Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling

Uses a protected access credential and TLS tunnel

70
New cards

TLS (Transport Layer Security)

highly effective for ensuring data privacy, it can also have an unintended consequence for cybersecurity. By encrypting internet traffic, TLS not only renders data unreadable; it also does the same for malware and other threats

71
New cards

RADIUS (Remote Authentication Dial-In User Service)

offers authentication, authorization, and accounting services, widely used for secure access to network resources

72
New cards

(TACACS+) Terminal Access Controller Access-Control System Plus

separates authentication, authorization, and accounting functions. More granular control, encrypts the authentication process using TCP for enhanced security

73
New cards

Fault-resistant RAID

Protects against the loss of the array's data if a single disk fails (RAID 1 or RAID 5)

74
New cards

Fault-tolerant RAID

Protects against the loss of the array's data if a single component fails (RAID 1, RAID 5, RAID 6)

75
New cards

Disaster-tolerant RAID

Provides two independent zones with full access to the data (RAID 10)

76
New cards

Data Steward

A role focused on the quality of the data and associated metadata

77
New cards

Memorandum of Understanding (MOU)

A non-binding agreement between two or more organizations to detail an intended common line of action. Often referred to as a letter of intent.

78
New cards

hping

An open-source packet generator and analyzer for the TCP/IP protocol that is used for security auditing and testing of firewalls and networks

79
New cards

netstat

Utility that displays network connections for Transmission Control Protocol, routing tables, and a number of network interface and network protocol statistics

80
New cards

grep

A command-line utility for searching plain-text data sets for lines that match a regular expression or pattern

81
New cards

tracert/traceroute

A network diagnostic command for displaying possible routes and measuring transit delays of packets across an Internet Protocol network

82
New cards

6 Step Incident Response

1. Preparation

2. Identification

3. Containment

4. Eradication

5. Recovery

6. Lessons Learned

83
New cards

ISO 31000

An international standard for enterprise risk management that provides a universally recognized paradigm for practitioners and companies employing risk management processes to replace the myriad of existing standards, methodologies, and paradigms that differed between industries, subject matters, and regions

84
New cards

ISO 27002

An international standard that provides best practice recommendations on information security controls for use by those responsible for initiating, implementing, or maintaining information security management systems (ISMS)

85
New cards

Cybersecurity Framework (CSF)

A set of industry standards and best practices created by NIST to help organizations manage cybersecurity risks

86
New cards

Business Partnership Agreement (BPA)

Conducted between two business partners that establishes the conditions of their relationship. Can also include security requirements.

87
New cards

Interconnection Security Agreement (ISA)

An agreement for the owners and operators of the IT systems to document what technical requirements each organization must meet

88
New cards

Service Level Agreement (SLA)

An agreement concerned with the ability to support and respond to problems within a given timeframe and continuing to provide the agreed upon level of service to the user

89
New cards

Non-Disclosure Agreement (NDA)

Agreement between two parties that defines what data is considered confidential and cannot be shared outside of the relationship

90
New cards

Due Process

A legal term that refers to how an organization must respect and safeguard personnels rights. Protects citizens from their government and companies from lawsuits.

91
New cards

Recovery Time Objective (RTO)

The length of time it takes after an event to resume normal business operations and activities.

92
New cards

Towers of Hanoi

Three sets of backup tapes (like the grandfather-father-son) that are rotated in a more complex system

93
New cards

Internet Key Exchange (IKE)

Method used by IPSec to create a secure tunnel by encrypting the connection between authenticated peers

94
New cards

Layer 2 Tunneling Protocol (L2TP)

A connection between two or more computers or device that are not on the same private network. Usually paired with IPSec to provide security. Uses port 1701.

95
New cards

Secure Sockets Layer (SSL)/Transport Layer Security (TLS)

Cryptographic protocols that provide secure internet communications for web browsing, instant messaging, email, VoIP, and many other services.

96
New cards

Certificate Signing Request (CSR)

A specially formatted encrypted message that validates the information the CA requires to issue a digital certificate.

97
New cards

Which of these protocols use TLS to provide secure communication?

HTTPS, TFPS

98
New cards

You've hired a third-party to gather information about your company's servers and data. The third-party will not have direct access to your internal network but can gather information from any other source. Which of the following would BEST describe this approach?

Passive footprinting

99
New cards

Which of these protocols use TLS to provide secure communication?

HTTPS, FTPS

100
New cards

An IPS at your company has found a sharp increase in traffic from all-in-one printers. After researching, your security team has found a vulnerability associated with these devices that allows the device to be remotely controlled by a third-party. Which category would BEST describe these devices?

MFD (Multifunction Device)