Dion Security+ Practice Exam 1 Review Notes

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/58

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

59 Terms

1
New cards

UTM (Unified Threat Management)

consolidates various security functionalities into a single appliance. It provides comprehensive protection by merging multiple security features, including intrusion detection/prevention, firewall capabilities, content filtering, and anti-malware tools, into one solution.

2
New cards

SOW (Statement of Work)

specifies the detailed scope of work, tasks, deliverables, timelines, and costs for a specific project or engagement with the vendor.

3
New cards

Service-level agreement (SLA)

a specific type of agreement that defines the level of service expected from the vendor, including performance metrics, response times, and other service-related terms.

4
New cards

DKIM (DomainKeys Identified Mail)

allows senders to associate a domain name with an email, thus vouching for its authenticity using a cryptographic signature.

5
New cards

SPF (Sender Policy Framework)

used to specify which mail servers are permitted to send email for a domain.

6
New cards

RPO (Recovery point objective)

defines the maximum acceptable amount of data loss measured in time, determining how old backup data can be to resume normal operations after a failure.

7
New cards

RTO (Recovery Time Objective)

indicates the target amount of time to restore IT and business activities post-disaster, focusing on downtime rather than data loss.

8
New cards

EAP (Extensible Authentication Protocol)

a protocol that provides a standard interface for integrating multiple authentication methods. It can be used in various network access scenarios, including wireless

9
New cards

Federation

a system allows different organizations to share digital identities, enabling single sign-on across them.

10
New cards

Whaling

a type of phishing attack that specifically targets high-profile employees, like executives or CEOs, to steal sensitive information.

11
New cards

AES (Advanced Encryption Standard)

is currently the most secure and widely used encryption protocol for wireless networks. It offers strong encryption algorithms and has withstood extensive testing demonstrating its resilience against various attacks.

12
New cards

Data Steward

person responsible for managing, maintaining, and ensuring the quality, security, and proper use of data within an organization.

13
New cards

Data Processor

a person or organization that processes personal data on behalf of a data controller.

14
New cards

Data Controller

the person or organization that determines how and why personal data is collected and processed.

15
New cards

Data Subject

any individual whose personal data is being collected, held, or processed by a data controller or processor.

16
New cards

NDA (Non-Disclosure Agreement)

a legal contract between parties (like a company and an employee, contractor, or third-party vendor) that defines what information must be kept confidential and not disclosed to anyone outside the agreement.

17
New cards

SDLC (Systems Development Life Cycle)

refers to the process of creating and maintaining computer applications

18
New cards

Change management

the process for reviewing and authorizing changes to IT systems in order to ensure that all changes are properly reviewed and authorized before being implemented.

19
New cards

In-Line Device

actively evaluates network traffic as it passes through, allowing it to reject or modify packets according to predefined security policies.

20
New cards

Certificate Revocation Lists (CRLs)

lists of certificates that have been revoked by a Certificate Authority before their scheduled expiration date.

21
New cards

SRTP (Secure Real-time Transport Protocol)

a protocol that provides encryption, message authentication, and integrity for voice communications over IP.

22
New cards

privilege escalation attack

a type of application attack that involves exploiting a vulnerability or misconfiguration to gain higher privileges or access than intended on a system or application.

23
New cards

Shadow IT

a type of threat actor that is the result of unauthorized or unapproved IT systems or devices within an organization. I

24
New cards

Insider Threat

a type of threat actor that has authorized access to an organization's network, systems, or data and has variable resources/funding and level of sophistication/capability depending on their role and position. They can abuse their authorized access, leak information, sabotage operations, or collaborate with external actors.

25
New cards

Impact analysis

the process of assessing and predicting the potential consequences of a proposed change, taking into account various aspects of an organization or system.

26
New cards

Logical segmentation

a technique of dividing a network into smaller subnetworks or segments based on criteria such as function, location, or security level. This provides better performance, security, and manageability of the network.

27
New cards

Risk Identification

the proactive process of recognizing and recording potential threats that could adversely affect an organization.

28
New cards

Master Service Agreement (MSA)

designed to establish the overall framework for a long-term business relationship between an organization and a vendor. It provides a foundation for future agreements and contracts by outlining general terms, conditions, and responsibilities.

29
New cards

Technology forecasting

the process of predicting future trends, threats, tools, and defense mechanisms by analyzing current and emerging technologies.

30
New cards

Risk transference

a method that involves transferring some or all of the risk associated with an activity or asset to another party, such as an insurance company or a vendor.

31
New cards

Mean Time to Repair (MTTR)

refers to the measure of the time taken to repair a system or process after it experiences a failure or disruption. It is the average time it takes to restore functionality.

32
New cards

Centralized governance

involves decision-making authority concentrated in a single authority or department within an organization.

33
New cards

Decentralized governance

involves distributing decision-making power among different departments or units within the organization, rather than being concentrated in a single authority.

34
New cards

Jump Server

also known as a jump host, acts as an intermediary server through which administrators can connect to other servers.

35
New cards

SCAP (Security Content Automation Protocol)

is a cybersecurity framework that combines various security standards, enabling automated vulnerability assessment, and compliance checking.

36
New cards

PGP

a cryptographic software tool for secure email communication and data protection

37
New cards

TOC/TOU (Time of Check / Time of Use)

A type of vulnerability where the state of a resource is verified at one point in time but may change before the resource is actually used

38
New cards

EDR (Endpoint Detection and Response)

a security solution that provides the capability for detection, analysis, response, and real-time monitoring of cyber threats at the device level

39
New cards

DEP (Data Execution Prevention)

prevents malicious code from executing in certain memory regions intended for data

40
New cards

IPSec (Internet Protocol Security)

A Layer 3 protocol that defines encryption, authentication, and key management for TCP/IP transmissions. Commonly used in VPNs

41
New cards

SGW (Secure Web Gateways)

are security checkpoints between your devices (like computers or phones) and the internet.

They filter, monitor, and control all web traffic to block threats (like malware, phishing, data leaks) before they ever reach your systems

42
New cards

SNMP (Simple Network Management Protocol)

is a network monitoring and management protocol that enables devices to send and receive alerts and data about their performance and status.

43
New cards

UPS (Uninterrupted Power Supply)

a device that provides emergency power to a load when the input power source fails, thus ensuring continuous operation

44
New cards

Enumeration

the process where an attacker actively gathers information about the target system, device, network, or application that they want to attack.

45
New cards

Reconnasiance

The process where an attacker passively gathers information information about the target system, device, network, or application

46
New cards

Spear Phishing

targeted cyberattack where a hacker sends a very personalized fake email (or message) to trick a specific person into giving up sensitive info or installing malware.

Different from regular phishing which is sent to random people

47
New cards

Attestation

a periodic review process where data owners or managers validate and confirm the access rights of all users.

48
New cards

KRI (Key Risk Indicators)

metrics that provide early warnings of increasing risk exposures, enabling organizations' leadership to manage these risks proactively.

49
New cards

RTOS (Real Time Operating System)

A type of OS that prioritizes deterministic execution of operations to ensure consistent response for time-critical tasks.

50
New cards

Policy Engine

a software component that decides whether an action should be allowed or denied based on predefined security rules (policies).

51
New cards

WAF (Web Application Firewall)

a firewall that is designed to filter, monitor, and block HTTP traffic to and from a web application, making it the most appropriate choice for temporary mitigation against a known vulnerability.

52
New cards

EOL (End of Life)

a type of vulnerability that occurs when a manufacturer no longer supports or updates software. It can allow an attacker to compromise the security or functionality of the device, or use it as a gateway to access other systems or networks.

53
New cards

Agent-based web filters

are filters installed directly on user devices, allowing for consistent enforcement of web filtering policies no matter where the device connects from.

54
New cards

MTBF (Mean Time Between Failures)

represents the typical interval between failures for a system or component, used as a reliability indicator.

55
New cards

Network Access Control (NAC)

enforces security policies for all devices connecting to the network by verifying compliance before granting access, helping to block unauthorized or insecure endpoints.

56
New cards

Concurrent session usage

an indicator of malicious activity that shows that an attacker or malware has compromised an account and is using it simultaneously with the legitimate user, creating multiple sessions from different locations or devices.

57
New cards

Decommissioning

a technique that can help reduce the risk of data breaches or theft by securely disposing of systems and devices that are no longer needed or used. Involves following a set of procedures to erase or destroy any sensitive data stored on the systems and devices, and to physically dispose of them in a safe and environmentally friendly manner.

58
New cards

Ephemeral credentials

are temporary, short-lived security credentials that exist only for a limited time — then automatically expire.

59
New cards

End of Service (EOS)

when a vendor or manufacturer stops supporting a product — no more updates, patches, or technical help. Pretty much when a product still might be used, but it no longer gets support or updates.