3.2 - CompTIA Security+

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

Security zones

Segments within a network designed to isolate and protect different types of data and services, categorized into trusted, untrusted, and semi-trusted areas.

2
New cards

Attack surface

The total sum of the vulnerabilities and entry points in a system that could be exploited by an attacker.

3
New cards

Connectivity

The manner in which components of a system are interconnected, influencing attack vectors and required security measures.

4
New cards

Fail-open

A condition where a security device/network component allows data to flow during a failure, potentially exposing the system to risks.

5
New cards

Fail-closed

A condition where a security device/network component prevents data flow during a failure.

6
New cards

Active monitoring configuration

A configuration that allows real-time analysis/prevention of security events, enabling immediate response to threats.

7
New cards

Passive monitoring configuration

A configuration that allows normal communication of devices while redirecting traffic to a monitoring device without impacting performance.

8
New cards

Jump server

A hardened device on an internal network accessible to outside users, allowing authorized connections to internal devices.

9
New cards

Proxy server

A network device that intercepts client requests and forwards responses back to clients.

10
New cards

Intrusion detection system (IDS)

A solution that detects unauthorized access to a network or system.

11
New cards

Intrusion prevention system (IPS)

A solution that detects and prevents unauthorized access to a network or system.

12
New cards

Load balancer

A device or software application that distributes incoming network traffic across multiple servers.

13
New cards

Sensors

Devices that monitor conditions in a network to gather data and identify potential threats.

14
New cards

Port security

Security measures applied to individual interfaces on a device or connections.

15
New cards

802.1X

A network protocol providing centralized authentication for devices trying to connect to a LAN or WLAN.

16
New cards

Extensible Authentication Protocol (EAP)

An authentication framework that supports multiple authentication methods for the authentication process.

17
New cards

Web application firewall (WAF)

Firewalls that analyze input into web applications to allow or block traffic based on the input.

18
New cards

Unified threat management (UTM)

Older firewalls that bundle multiple security features into a single device.

19
New cards

Next-generation firewall (NGFW)

A security solution that filters application-level traffic and includes features like deep packet inspection.

20
New cards

Layer 4 device

A firewall/network device that inspects traffic over OSI layer 4 (Transport layer).

21
New cards

Layer 7 device

A firewall/network device that inspects traffic over OSI layer 7 (Application layer).

22
New cards

Virtual private network (VPN)

A device that encrypts internet traffic and creates a secure tunnel for remote access.

23
New cards

Remote access

A method allowing users to connect to a private network over the internet for secure communication.

24
New cards

Tunneling

A technique used to encapsulate and encrypt data packets within another packet for secure transmission.

25
New cards

Transport Layer Security (TLS)

A cryptographic protocol for secure communication over a computer network, an upgrade to SSL.

26
New cards

Internet Protocol Security (IPSec)

A network security protocol used to encrypt IP packets and authenticate packet sources.

27
New cards

Software-defined wide area network (SD-WAN)

Networking technology using SDN to manage WAN performance.

28
New cards

Secure Access Service Edge (SASE)

A cloud-based architecture integrating network security functions with WAN capabilities.