CompTIA Security+ Certification Practice Exams

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/50

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering network devices, security protocols, fundamental security concepts, common attack types, and hardening techniques based on CompTIA Security+ practice exam questions.

Last updated 2:19 AM on 5/18/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

51 Terms

1
New cards

Router

A network device that transmits data between different networks by examining the destination network address in a packet.

2
New cards

Layer 2 switch

A device used to separate a large busy network into many smaller collision domains.

3
New cards

Load balancer

A solution that increases web server performance by distributing incoming connections between multiple web servers hosting the same content.

4
New cards

VLAN

A technology used to isolate customer traffic from corporate network traffic on the same physical infrastructure.

5
New cards

SNMP

Simple Network Management Protocol; a protocol used for network management traffic that should be allowed through wireless routers for administration.

6
New cards

IPv6

An IP protocol suite that uses $128$-bit IP addresses.

7
New cards

MX Record

A DNS resource record used to identify the mail server responsible for receiving e-mail for a domain.

8
New cards

ICMP

Internet Control Message Protocol; the protocol suite used for ping traffic.

9
New cards

iSCSI

A SAN disk access protocol that operates over a dedicated TCP/IP network.

10
New cards

Fibre Channel SAN

A storage area network solution that uses optical technology designed solely for high-speed connectivity from servers to disk storage.

11
New cards

FTP

File Transfer Protocol; uses TCP ports $20$ and $21$.

12
New cards

TFTP

Trivial File Transfer Protocol; a protocol that does not have authentication configuration options and uses UDP port $69$.

13
New cards

Telnet

A protocol used for performing clear-text remote command-line management.

14
New cards

HTTPS

Hypertext Transfer Protocol Secure; a secure protocol that uses TCP port $443$.

15
New cards

NTP

Network Time Protocol; designed to synchronize time between computers.

16
New cards

Tracert

A troubleshooting tool used to verify the routers in a transmission path between two hosts.

17
New cards

RDP

Remote Desktop Protocol; a protocol used for remote connections that requires port $3389$ to be open.

18
New cards

Confidentiality

A security concept focused on ensuring that data is only available to authorized users through methods like encryption and file permissions.

19
New cards

Integrity

A security concept focused on ensuring that data or programs have not been tampered with, often using digital signatures or file hashing.

20
New cards

Availability

A security concept focused on ensuring that systems and data are accessible when needed, often through clustering, backups, or RAID.

21
New cards

Steganography

An alternative method of sending confidential messages by hiding information within other files, such as personal photos.

22
New cards

Auditing

The process of tracking modifications to sensitive files to ensure accountability and nonrepudiation.

23
New cards

Data Owner

The party responsible for determining how data labels are assigned to information.

24
New cards

Least Privilege

A security principle where users are assigned only the minimum permissions necessary to complete their required tasks.

25
New cards

Tailgating

A security breach where an unauthorized person follows an authorized individual into a secure facility.

26
New cards

Phishing

An attack involving fraudulent e-mails that attempt to lure users into providing credentials on a fake website.

27
New cards

Zero-day exploit

An attack that uses an exploit for a vulnerability that is currently unknown to the product vendor.

28
New cards

Separation of Duties

A security control that restricts individuals from performing conflicting management tasks, such as preventing firewall administrators from modifying logs.

29
New cards

SLA

Service Level Agreement; a document from a provider that states a specific percentage of service availability.

30
New cards

Clean Desk Policy

A policy requiring that all paper documents containing sensitive data are protected or shredded so they cannot be stolen.

31
New cards

Mandatory Vacation

A security policy designed to prevent and detect improper or fraudulent activity by employees.

32
New cards

ARP Poisoning

An attack that modifies the ARP cache of a system to associate an IP address with the wrong MAC address.

33
New cards

Mantrap

A physical protective control used in high-security environments to limit or prevent tailgating.

34
New cards

Buffer Overflow

An attack that sends excessive data to an application to overwrite memory and run arbitrary code.

35
New cards

SQL Injection

An attack involving the insertion of malicious database code into a web page input field, often using strings like 'or 1=1--'.

36
New cards

Spoofing

An attack where the hacker modifies the source IP address of a packet to impersonate another system.

37
New cards

Domain Kiting

The process of repeatedly registering and deleting a domain name to avoid paying for it.

38
New cards

XSS

Cross-site scripting; an attack involving the insertion of a client-side script into a web page.

39
New cards

Man-in-the-middle

An attack where a hacker intercepts traffic between two parties on a network, often via ARP poisoning.

40
New cards

Session Hijacking

An attack where a hacker disconnects a party from a communication and takes over the session while impersonating that system.

41
New cards

Vishing

A social engineering attack conducted over the phone to obtain personal or financial information.

42
New cards

Trojan

Malicious software that is disguised as a legitimate program, such as a free utility or tax software.

43
New cards

Keylogger

Hardware or software that captures every character a user types on their keyboard.

44
New cards

Botnet

A network of compromised computers that receive remote commands to perform coordinated actions like a DDoS attack.

45
New cards

Spam

The transmission of unwelcome bulk messages, often via e-mail.

46
New cards

Ransomware

Malicious software that encrypts a user's files and provides payment instructions for decryption.

47
New cards

Polymorphic Malware

Malware that dynamically alters its code to avoid detection by security software.

48
New cards

Fuzzing

The process of testing web site code by providing malformed URLs and an abundance of random data to ensure robustness.

49
New cards

Hardening

The process of disabling unneeded network services on a computer to reduce its attack surface.

50
New cards

Initial Baseline Configuration

Standardized security parameters and settings applied to newly deployed systems.

51
New cards

Remediation

The process of bringing a non-compliant system into compliance with security health policies, such as installing required software updates.