CompTIA A+ 1102 Security

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 59

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

60 Terms

1

Key Fobs

- contains a small RFID key

- contactless

- replaces a physical key

- utilizes proximity operationality

New cards
2

Smart Cards

- provide certificate based authentication

- requires a smart card reader to authenticate

New cards
3

Does biometric authentication store an image of your unique biometric?

no, biometric authentication is usually stored as a mathematical representation.

New cards
4

Magnometers

- metal detectors

- provides passive scanning

New cards
5

Mobile Device Management (acronym)

MDM

New cards
6

MDM

provides centralized management for company owned and user owned devices

New cards
7

Rule of Least Privilege

rights and permissions should be set to the bare minimum for both user accounts and applications.

New cards
8

Access Control Lists (acronym)

ACL

New cards
9

ACL

- used to allow or deny traffic

- also used by operating systems

- commonly used on the ingress or egress of a routing interface

New cards
10

Phishing

- social engineering with a touch of spoofing

- often delivered by email or over text

New cards
11

Voice Phishing (acronym)

Vishing

New cards
12

Vishing

- phishing that occurs over the phone or through voicemail

- caller ID spoofing is common

New cards
13

Spear Phishing

targeted phishing, using insider information

New cards
14

Whaling

spear phishing the CEO of a company

New cards
15

Tailgating

- uses an authorized person to gain unauthorized access to a building

- the attacker does not have consent

New cards
16

Piggybacking

- uses an authorized person to gain unauthorized access to a building

- unlike tailgating, the attacker does have consent

- for example, the attacker is holding donuts and asks to have the office door held for them

New cards
17

Zero-Day Attacks

- an attack type that exploits a vulnerability, known to the attackers, but unknown to the application's/system's/device's vendor and support team are aware of it

- utilizes exploit code

New cards
18

On-Path Attacks

- also known as a man-in-the-middle attack

- the attacker sits in between your system and the network, and redirects your traffic

New cards
19

Address Resolution Protocol (acronym)

ARP

New cards
20

ARP Poisoning

- utilizes spoofing

- an on-path attack that occurs on the local IP subnet

- due to ARP's lack of security features

New cards
21

On-Path Browser Attacks

- the man-in-the-middle is on the local device, in the browser

- the attacker uses the advantage of encrypted traffic being so easy to proxy

- malware, often a trojan horse does all of the proxy work

New cards
22

Hashes and Hashing a Password

- represent data as a fixed-length string of test

- will likely not have a collision (match another hash)

- makes it impossible to recover an original message from the digest

- without knowing the hash, the hashing method, etc.

- SHA-256 is a common hashing method.

- different operating systems and applications use different hash algorithms.

New cards
23

Brute Force Attacks

- a form of password attack where attackers try every single possible password combination, until the password's hash is matched

- time consuming

- also requires a large amount of computing power and resources

New cards
24

Code Injection

- adding your own code into a data stream

- enabled due to bad programming

- many different data types

New cards
25

Structured Query Language (acronym)

SQL

New cards
26

SQL Injection

- a method of code injection where SQL requests are modified

- if you can manipulate an SQL database, then you can control the application

New cards
27

Cross-Site Scripting (acronym)

XSS

New cards
28

Cross-Site Scripting

- we take information from one website and share it with another

- utilizing browser security flaws

- one of the most common web application development errors

- by using malware that takes advantage of JavaScript

New cards
29

Why is Cross-Site Scripting abbreviated as XSS?

though CSS seems like a better acronym for cross-site scripting, it is already utilized for a programming language, used in website design.

New cards
30

What are some of the most common programming languages, used for developing websites and web applications? (list)

- JavaScript

- provides the interactivity to websites and web applications

- HTML

- CSS (cascading style sheets)

- used for describing the presentation of code, written in a term-30markup language, such as HTML

- Java

- not related to JavaScript

- used to develop web applications, games, and software

New cards
31

Uniform Resource Locator (acronym)

URL

New cards
32

Non-Persistent (Reflected) Cross-Site Scripting Attacks (steps)

1. the website allows scripts to run inside of user input prompts and text boxes

2. to utilize this design flaw, the attacker emails a link

3. this link runs a script that sends credentials, session IDs, and cookies to the attacker

4. simultaneously, the script embedded in the URL executes in the victim's browser

New cards
33

URL vs Domain Name (example)

- google.com is an example of a fully qualified domain name.

- as seen above, a domain name does not include the protocol, and any subdomains, paths, or file names.

- a website URL includes all of these components.

- https://www.google.com/search?q=domain+name&sxsrf=ALiCzsYV67... is an example of a URL, and includes the domain name, "google.com", as well as the:

- protocol (HTTPS)

- subdomain (www)

- path (/search?q=domain+name&sxsrf=ALiCzsYV67/)

- always ends with "/"

- in this example, the URL is shortened due to space constraints (shown by the "..." at the end of the shown URL"

- as our web search did not lead us into viewing or opening a file, no file path is included.

- an example of a URL with a file path, however, is https://www.google.com/search/file.html

- (note that this URL is made-up)

- this example's file path is "file.html"

** (note that miranda, the creator of this Quizlet set is currently unsure if the file path of a URL includes the backslashes, or not. however, extensive URL knowlege is not listed in the exam objetives, and therefore, is very unlikely to be on the CompTIA A+ 220-1102 A+ Exam. in the future (after i pass my exam), though, i'll try to remember to further research this, and will edit this term's definition, accordingly :)) **

** insert image of miranda peace signing for time-keeping purposes, i'm typing this the evening of 8/6/22, with my test scheduled for 8/9/22; let's see how long my update takes! **

New cards
34

URL

a complete web address

New cards
35

Persistent (Stored) Cross-Site Scripting Attacks

- malicious code is placed on a centralized server, such as a social media website

- inside of a comment, for example

- everybody who visits the page or who views the comment gets attacked

- no specific target

New cards
36

Will disabling JavaScript protect against Cross-Site Scripting attacks?

yes, however, it's not a practical solution

New cards
37

Standard Operating Environment (acronym)

SOE

New cards
38

Standard Operating Environments

- a set of tested and approved hardware/software systems

- often a standalone OS image

New cards
39

When does Microsoft release Window's patches?

the second tuesday of every month at 10:00am PST

New cards
40

Patch Management (steps)

1. test

2. prioritize

3. deploy

New cards
41

EOL Operating Systems

- manufacturer stops selling an OS

- may continue supporting it, though

New cards
42

End of Service Life (acronym)

EOSL

New cards
43

EOSL

- similar to EOD, but support is no longer available

- a costly, premium support option may exist, though

New cards
44

Windows Defender Antivirus

- built into Windows 10 and Windows 11

- included in the Windows security application

- operates in real-time

- virus & threat protection settings > manage settings > real-time protection

New cards
45

Windows Firewall Exception Rule Types (list)

- program

- port

- predefined

- custom

New cards
46

Windows Authentication

- log in using a local account or a Microsoft account or a domain account

- Windows domain credentials are SSO

New cards
47

NTFS Permissions

- apply from local and network connections

- inherited from the parent

New cards
48

Share Permissions

- only apply to connections over the network

- the most restrictive setting wins

New cards
49

Explicit Permissions

- set by us

- take precedence over inherited permissions

New cards
50

User Account Control (acronym)

UAC

New cards
51

User Account Control

- pop-up approval screen

- limits user capabilities

- secure desktop

New cards
52

BitLocker

- encrypts an entire volume

- all data, including the OS

- not included in Windows Home editions

New cards
53

BitLocker To Go

- BitLocker FDE for USB drives

- not included in Windows Home editions

New cards
54

EFS

- encrypt at the file system level

- requires NTFS

- uses a username and password to encrypt the key

- administrative password resets cause EFS files to be inaccessible

New cards
55

Autoplay

- settings > bluetooth & devices > Autoplay

- AutoRun on older Windows operating systems

New cards
56

Verifying Certificate Details (list)

verify

- not expired

- domain name

- properly signed

- date and time

New cards
57

Cache

locally stored browser data

New cards
58

Unable to Access The Network (Troubleshooting)

- may be due to malware

- symptoms:

- slow performance and lock up

- internet connectivity issues

- OS update failures

- use malware cleaner or reload from a known good backup

New cards
59

Altered System or Personal Files (Troubleshooting)

- indicates malware

- remove or reload from a known good backup

New cards
60

Browser Redirection (Troubleshooting)

- malware is the most common cause

- best practice is to restore from a known good backup

New cards

Explore top notes

note Note
studied byStudied by 38 people
910 days ago
4.0(1)
note Note
studied byStudied by 4 people
58 days ago
5.0(1)
note Note
studied byStudied by 72 people
199 days ago
5.0(1)
note Note
studied byStudied by 8 people
954 days ago
5.0(1)
note Note
studied byStudied by 20 people
1006 days ago
4.0(1)
note Note
studied byStudied by 13 people
890 days ago
5.0(1)
note Note
studied byStudied by 34 people
848 days ago
5.0(1)
note Note
studied byStudied by 767 people
708 days ago
4.0(4)

Explore top flashcards

flashcards Flashcard (71)
studied byStudied by 2 people
747 days ago
5.0(1)
flashcards Flashcard (49)
studied byStudied by 3 people
302 days ago
5.0(2)
flashcards Flashcard (27)
studied byStudied by 4 people
828 days ago
5.0(1)
flashcards Flashcard (57)
studied byStudied by 40 people
465 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 34 people
497 days ago
5.0(1)
flashcards Flashcard (25)
studied byStudied by 62 people
793 days ago
5.0(2)
flashcards Flashcard (82)
studied byStudied by 100 people
515 days ago
5.0(1)
flashcards Flashcard (68)
studied byStudied by 97 people
23 days ago
5.0(1)
robot