CompTIA Security+ SY0-701 - Vocabulary Flashcards

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/48

flashcard set

Earn XP

Description and Tags

A set of vocabulary flashcards covering core terms and concepts from the CompTIA Security+ SY0-701 lecture objectives.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

49 Terms

1
New cards

CIA

Confidentiality, Integrity, and Availability; the three core objectives of information security.

2
New cards

AAA

Authentication, Authorization, and Accounting; components for verifying identity, granting access, and auditing activity.

3
New cards

Non-repudiation

A guarantee that a sender cannot deny sending a message or action, often supported by digital signatures and logs.

4
New cards

Zero Trust

Security model that requires verification of every access attempt, regardless of location or network origin.

5
New cards

Data Plane

The network layer responsible for forwarding data and enforcing policies, separate from the Control Plane.

6
New cards

Control types

Categories of security controls: Preventive, Deterrent, Detective, Corrective, Compensating, and Directive.

7
New cards

Physical security

Measures to protect hardware and facilities (e.g., bollards, fencing, lighting, guards, video surveillance).

8
New cards

Honeypot/Honeynet/Honeytoken

Deception technologies: a honeypot is a decoy system, a honeynet is a network of decoys, and a honeytoken is decoy data.

9
New cards

PKI

Public Key Infrastructure; system for creating, managing, and validating digital certificates and keys.

10
New cards

Encryption

Process of converting plaintext to ciphertext to protect confidentiality; includes symmetric/asymmetric and data-at-rest/in-transit protections.

11
New cards

Hashing

One-way function that produces a fixed-length digest; often salted and used for data integrity.

12
New cards

Digital signatures

Cryptographic signatures that verify the origin and integrity of data.

13
New cards

Certificates

Digital credentials issued by a Certificate Authority; include CRLs, OCSP, CSR; establish a chain of trust (root of trust) and can be wildcard.

14
New cards

Change management

Formal process for approving, implementing, and backing out changes; includes ownership, impact analysis, maintenance windows, SOPs, and version control.

15
New cards

Threat actors

Entities that carry out attacks: nation-state, insider threat, hacktivist, organized crime, shadow IT; with varying access and goals.

16
New cards

Threat vectors

Paths and methods attackers use: email, SMS, IM, file-based, web, removable media, supply chain, and social engineering.

17
New cards

SQL injection (SQLi)

Web-based vulnerability where attacker injects SQL to manipulate backend databases.

18
New cards

Cross-site scripting (XSS)

Vulnerability allowing injection of malicious scripts into web pages viewed by other users.

19
New cards

Buffer overflow

Memory boundary overflow that can lead to code execution or crashes.

20
New cards

Time-of-check/Time-of-use (TOC/TOU)

Race-condition vulnerabilities where a check occurs at one time but state changes before use.

21
New cards

Supply chain risk

Risks introduced by third-party vendors, MSPs, or components in products and services.

22
New cards

OSINT

Open-source intelligence; gathering information from publicly available sources.

23
New cards

Vulnerability management

Process to identify, classify, prioritize, remediate, and validate vulnerabilities (uses CVSS/CVE).

24
New cards

CVSS

Common Vulnerability Scoring System; standard for rating vulnerability severity.

25
New cards

CVE

Common Vulnerabilities and Exposures; a catalog of publicly known vulnerabilities.

26
New cards

Penetration testing

Authorized, simulated cyberattack to identify and validate security weaknesses.

27
New cards

Indicators of compromise (IoC)

Evidence of security incidents (e.g., account lockouts, impossible travel, anomalous logs).

28
New cards

Data classifications

Categories for data sensitivity: Sensitive, Confidential, Public, Restricted, Private, Critical.

29
New cards

Data states

Data at rest, data in transit, and data in use; each requires different protections.

30
New cards

Data sovereignty

Legal and regulatory jurisdiction based on data location and geolocation concerns.

31
New cards

High availability

Design approach to minimize downtime and ensure continuous service operation.

32
New cards

Load balancing

Distributing network or application traffic across multiple servers to optimize performance and availability.

33
New cards

Backups

Copies of data stored onsite or offsite, often encrypted with snapshots and recovery capabilities.

34
New cards

Incident response lifecycle

Phases: Preparation, Detection/Analysis, Containment, Eradication, Recovery, and Lessons learned.

35
New cards

Governance structures

Bodies like boards and committees that oversee security policy, standards, and compliance.

36
New cards

Risk management

Process of identifying, assessing, and prioritizing risks; involves risk tolerance, appetite, and treatment strategies (transfer, mitigate, avoid, accept).

37
New cards

Third-party risk management

Assessment and oversight of external vendors: due diligence, NDAs, SLAs, MOA/MOU/MSA/SOW, and monitoring.

38
New cards

Security awareness

Programs to educate about phishing, social engineering, password hygiene, and policy adherence.

39
New cards

Multifactor authentication (MFA)

Authentication requiring two or more factors: something you know, have, or are (and sometimes location).

40
New cards

SSO/OAuth/SAML

Identity and access management concepts: SSO enables one sign-on; OAuth and SAML enable federated access.

41
New cards

NAC

Network Access Control; restricts network access to compliant devices.

42
New cards

EDR/XDR

Endpoint Detection and Response; XDR expands detection and response across multiple domains.

43
New cards

DLP

Data Loss Prevention; systems that detect and prevent sensitive data leakage.

44
New cards

VPN

Virtual Private Network; secure remote access to a network.

45
New cards

TLS

Transport Layer Security; cryptographic protocol that provides secure communications over a computer network.

46
New cards

IPSec

Internet Protocol Security; suite of protocols to secure IP communications, often used in VPNs.

47
New cards

WAF

Web Application Firewall; protects web applications from common web exploits.

48
New cards

NGFW

Next-generation firewall; includes application-level filtering and integrated security features.

49
New cards

IDS/IPS

Intrusion Detection System monitors for suspicious activity; Intrusion Prevention System can block it.