CompTIA Security+ (SY0-701) Study Notes

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/27

flashcard set

Earn XP

Description and Tags

This array of flashcards focuses on key terminology and concepts related to the CompTIA Security+ (SY0-701) exam, designed to support studying and mastery of the course content.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

28 Terms

1
New cards

CompTIA Security+ (SY0-701) certification

An intermediate level information technology certification focusing on assessing the security posture of an enterprise environment.

2
New cards

CIA Triad

Framework for addressing security that stands for Confidentiality, Integrity, and Availability.

3
New cards

Zero Trust Model

Security concept that assumes no user or device should be trusted by default, and verification is required for each access request.

4
New cards

Vulnerability

Any weakness in the system design or implementation that can be exploited by a threat.

5
New cards

Risk Management

The process of identifying, assessing, and controlling risks to minimize the impact of potential losses.

6
New cards

Authentication

The process of verifying the identity of a user or system.

7
New cards

Authorization

Determining actions or resources that an authenticated user can access.

8
New cards

Non-Repudiation

A security principle ensuring that an action or event cannot be denied by the involved parties.

9
New cards

Malware

Malicious software designed to infiltrate or damage computer systems without user consent.

10
New cards

Phishing

A social engineering attack aimed at tricking individuals into revealing personal information by impersonating a trusted entity.

11
New cards

Password Management

Techniques and policies for creating, storing, and managing passwords to enhance security.

12
New cards

Social Engineering

Manipulative strategies that exploit human psychology to gain unauthorized access to systems, data, or physical spaces.

13
New cards

Insider Threats

Security risks that originate from within the organization, often involving employees or contractors.

14
New cards

Endpoint Detection and Response (EDR)

Security solution that continuously monitors endpoint devices to identify and respond to cyber threats.

15
New cards

Patch Management

Process for managing software updates that fix vulnerabilities in software, applications, and systems.

16
New cards

Incident Response

The systematic approach to managing and mitigating security incidents.

17
New cards

Threat Intelligence Feeds

Continuous streams of data providing information about potential or current threats to an organization's security.

18
New cards

Compensating Controls

Alternative measures implemented when primary security controls cannot be effectively enacted.

19
New cards

Audit Trail

A record showing who accessed or modified data, useful for tracking changes and identifying security breaches.

20
New cards

Security Information and Event Management (SIEM)

A comprehensive platform that aggregates and analyzes security data from across an organization to detect and respond to threats.

21
New cards

Ransomware

Malicious software that locks or encrypts a user's data and demands a ransom for access.

22
New cards

Data Loss Prevention (DLP)

Strategies to prevent sensitive information from being lost, misused, or accessed by unauthorized users.

23
New cards

Multi-Factor Authentication (MFA)

A security mechanism that requires two or more forms of verification before granting access.

24
New cards

Common Vulnerabilities and Exposures (CVE)

A list of publicly disclosed cybersecurity vulnerabilities, each assigned a unique identifier for tracking.

25
New cards

Bus Factor

A measure of risk in a project or organization, indicating how many people need to be unavailable for the work to stop.

26
New cards

Cloud Security

Policies and technologies designed to protect data and applications hosted in cloud computing environments.

27
New cards

Access Control List (ACL)

A list that specifies which users have permission to access particular resources in a system.

28
New cards

Security Policies

Formal guidelines defining expected security behavior within an organization.