CompTIA Security+ SY0-701 Flashcards - Created By Jeff Chaplin

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/245

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

246 Terms

1
New cards

Preventive Controls

Objective: Prevent security incidents from occurring. Examples: Firewalls, Access control mechanisms (e.g., passwords, biometrics) Intrusion prevention systems (IPS), Security policies and procedures

2
New cards

Deterrent Controls

Objective: Discourage potential attackers from attempting to compromise a system. Examples: Warning signs, Security awareness training, Visible security measures (e.g., security guards, CCTV)

3
New cards

Detective Controls

Objective: Detect and alert on security incidents as they occur. Examples: Intrusion detection systems (IDS), Security information and event management (SIEM) systems, Audit logs and monitoring, Surveillance cameras

4
New cards

Corrective Controls

Objective: Correct and mitigate the impact of security incidents. Examples: Antivirus and anti-malware software, Backup and recovery procedures, Patch management systems, Incident response plans

5
New cards

Compensating Controls

Compensating controls are security measures implemented to provide an alternative method of protecting assets when standard controls are not feasible. Examples: Temporary access restrictions, Alternative authentication mechanisms, Additional monitoring when primary controls are down

6
New cards

Directive Controls

Objective: Specify acceptable practices and expected behavior. Examples: Security policies and guidelines, Employee handbooks, Standard operating procedures (SOPs), Codes of conduct

7
New cards

Define the Five Core principles of Information Security (CIANA)

Confidentiality, Integrity, Availability, Non-Repudiation, Authentication

8
New cards

Gap Analysis Steps

Define the scope, Gather data about the current infrastructure, Analyze the data and identify the gaps, Develop a plan to bridge the gap

9
New cards

Honeypot

A honeypot is a decoy system or resource designed to attract and deceive attackers. It appears to be a legitimate part of the network but is isolated and monitored to gather information about attackers' tactics, techniques, and motives.

10
New cards

Honeynet

A honeynet is a network of honeypots that are interconnected to simulate a larger and more realistic environment for attracting and monitoring attackers. It allows organizations to capture and analyze broader attack patterns and behaviors.

11
New cards

Honeyfile

A honeyfile is a file or document that is intentionally created and placed in a network to act as bait for attackers. It contains seemingly valuable information that, if accessed or modified, triggers alerts and provides insights into unauthorized access attempts.

12
New cards

Honeytoken

A honeytoken is a piece of data or credential that is intentionally placed within an information system to serve as a decoy or indicator of unauthorized access. If a honeytoken is accessed or used, it alerts security teams to potential security breaches.

13
New cards

Non-Repudiation

A security principle ensuring that a party in a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated. This is typically achieved through the use of cryptographic methods, such as digital signatures and public key infrastructure (PKI).

14
New cards

What are the five factors of Authentication

Knowledge Factor: Something You Know, Possession Factor: Something You Have, Inherence Factor: Something You Are, Behavioral Biometrics: Something You Do, Location Factor: Somewhere You Are

15
New cards

PTZ

Pan-Tilt-Zoom

16
New cards

FRR

False Rejection Rate - How often a biometric system fails to allow a user access who should have had access

17
New cards

Chiper Lock

A Mechanical locking mechanism that uses a mechanical keypad for entry

18
New cards

Infrared Sensor

IR sensors can be either active or passive. Active IR sensors emit infrared light and measure the reflection, while passive IR sensors detect the infrared light naturally emitted by objects. Used in: Motion Detection, Remote Controls, Thermal Cameras, Temperature sensors

19
New cards

Microwave Sensor

A microwave sensor uses microwave radar to detect objects and motion. These sensors emit microwaves and measure the time it takes for the waves to be reflected back after hitting an object. Used in: Automatic Doors, Speed Radars, Occupancy Sensing, Motion sensors

20
New cards

Ultrasonic Sensor

An ultrasonic sensor uses ultrasonic sound waves to detect objects and measure distances. The sensor emits sound waves at a high frequency and measures the time it takes for the echo to return after hitting an object. Used in: Parking Assistance, Robotics, Industrial Automation

21
New cards

Shadow IT

A type of threat actor that creates internal threats involving the use of systems, devices, software, applications, and services that are used within an organization without explicit approval or knowledge of the organization's IT department.

22
New cards

Name all four Security Controls

Detective, Compensating, Directive, Corrective

23
New cards

Social Proof

A psychological and social phenomenon where individuals copy the actions of others in an attempt to reflect correct behavior for a given situation. This concept is often exploited in social engineering attacks

24
New cards

Typosquatting

"Typosquatting" is a form of cyber-attack where malicious actors register domain names that are similar to legitimate websites, often differing by a small typo or misspelling. Example: Real: Facebook.com | Fake: Facebo0k.com

25
New cards

Watering Hole Attack

A "watering hole attack" is a type of cyber-attack in which attackers compromise a specific website or set of websites that are frequently visited by a particular group, organization, or industry. The goal is to infect the visitors of these sites with malware.

26
New cards

Phishing

Phishing is a cyber-attack where attackers send fraudulent emails or messages pretending to be from reputable sources to trick individuals into revealing sensitive information, such as usernames, passwords, and credit card details.

27
New cards

Spear Phishing

Spear phishing is a targeted phishing attack aimed at a specific individual or organization. Attackers gather personal information about their target to craft a highly personalized and convincing email or message to deceive them into revealing sensitive information.

28
New cards

Whaling

Whaling is a type of phishing attack that targets high-profile individuals, such as executives or senior management, within an organization. The attacker impersonates a trusted entity to deceive the target into divulging sensitive information or authorizing significant financial transactions.

29
New cards

Vishing

Vishing, or voice phishing, involves attackers using phone calls to impersonate legitimate organizations or individuals to trick victims into providing personal information, such as credit card numbers or social security numbers.

30
New cards

Smishing

Smishing, or SMS phishing, involves attackers sending fraudulent text messages that appear to come from reputable sources. These messages often contain links or phone numbers that lead to phishing websites or prompt the victim to provide personal information.

31
New cards

Business Email Compromise (BEC)

Business Email Compromise (BEC) is a sophisticated phishing attack where attackers spoof or compromise a legitimate business email account to deceive employees, partners, or customers into transferring money or sensitive information. BEC often targets employees with access to company finances or valuable data.

32
New cards

Invoice Scam

A type of social engineering attack where cybercriminals send fraudulent invoices to a business or individual, hoping to trick the recipient into making a payment to the attacker's account.

33
New cards

Baiting

"Baiting" is a type of social engineering attack where an attacker entices a victim with a lure, such as a seemingly harmless or appealing object, to trick them into compromising their security.

34
New cards

Piggybacking

Piggybacking occurs when an unauthorized person convinces an authorized person to allow them access into the facility.

35
New cards

Diversion Theft

Diversion Theft is a tactic used by criminals to distract or divert attention away from a target in order to carry out a theft or other criminal activity.

36
New cards

Threat Vector

A threat vector is the method or avenue by which a threat actor gains access to a target system or network in order to execute an attack.

37
New cards

Attack Vector

An attack vector is the specific technical method or process used by a threat actor to exploit a vulnerability or execute an attack once they have gained access via a threat vector.

38
New cards

Boot Sector Virus

A type of virus that infects the master boot record (MBR) of a hard drive, loaded into memory upon booting to take control of the computer before the operating system is loaded.

39
New cards

Macro Virus

A virus written in the same macro language used for software applications, typically embedded in documents and executed when the document is opened.

40
New cards

Program Virus

A virus that infects executable programs or applications, executing virus code when infected programs run.

41
New cards

Multipartite Virus

A sophisticated virus that can infect multiple parts of a system, making it challenging to remove.

42
New cards

Encrypted Virus

A virus that uses encryption to hide its code from antivirus software, decrypting itself when executed to perform malicious activities.

43
New cards

Polymorphic Virus

Complex file infectors that can create modified versions of itself to avoid detection yet retain the same basic routines after every infection.

44
New cards

Metamorphic Virus

A highly sophisticated virus that can change its own code by translating, editing, and rewriting it.

45
New cards

Armored Protection

Techniques used by malware to shield itself from detection and analysis by security researchers and antivirus software.

46
New cards

Malware

Any software intentionally designed to cause damage, disrupt operations, steal data, or harm the functionality, security, or privacy of computer systems, networks, or devices.

47
New cards

Worm

A type of standalone malware that replicates itself to spread to other computers without needing to attach to an existing program or file.

48
New cards

Trojan

A type of malware that disguises itself as legitimate software to deceive users into installing it for executing malicious activities.

49
New cards

RAT

A Remote Access Trojan that allows an attacker to gain unauthorized remote access and control over a compromised computer.

50
New cards

Botnet

A network of compromised computers controlled by an attacker to carry out malicious activities.

51
New cards

Command and Control (C&C or C2) node

A server or infrastructure used by attackers to maintain communication and control over compromised systems within a botnet.

52
New cards

Rootkit

A program or a collection of malicious software tools that give a threat actor remote access to and control over a computer or other system.

53
New cards

DLL

Dynamic Link Library is a file in Microsoft Windows containing code and data for use by multiple programs simultaneously to promote code reuse and modularization.

54
New cards

DLL Injection

A technique used to insert a malicious Dynamic Link Library (DLL) into the address space of another process to execute arbitrary code within the context of a legitimate application.

55
New cards

Kernel Mode

Also known as Supervisor Mode or Ring 0, refers to a privileged mode of execution where the operating system's kernel has unrestricted access to the hardware and system resources.

56
New cards

Logic Bomb

A type of malicious code or software program intentionally inserted into a system to execute a harmful action when certain conditions are met.

57
New cards

Keylogger

A type of malicious software or hardware device designed to record and monitor every keystroke made by a user on a computer or mobile device.

58
New cards

Impossible Travel

An activity where a user's account shows login attempts from geographically impossible locations within a short period of time.

59
New cards

Fileless Malware

A type of malicious code that operates in a computer's memory, usually in RAM, instead of on the hard drive and utilities such as PowerShell, Windows Management Instrumentation (WMI).

60
New cards

All the classification levels from highest to lowest for the government

1. Top Secret

2. Secret

3. Confidential

4. Sensitive but Unclassified

5. Unclassified

61
New cards

What technologies would you use to secure data in transit?

IPsec

SSL

TLS

62
New cards

PII

Personally Identifiable Information, a type of regulated data.

63
New cards

PHI

Protected Health Information, a type of regulated data.

64
New cards

PCI

Payment Card Information, a type of regulated data.

65
New cards

IP

Intellectual Property, a type of regulated data.

66
New cards

Financial Data

A type of regulated data.

67
New cards

HIPPA

Regulation protecting PHI - Protected Health Information.

68
New cards

GDPR

General Data Protection Regulation, a comprehensive data protection law enacted by the European Union (EU).

69
New cards

DLP

Data Loss Prevention, a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.

70
New cards

PCI DSS

Payment Card Industry Data Security Standard, a security standard created by the Payment Card Industry Security Standards Council (PCI SSC)

71
New cards

Network DLP

Software or hardware that's placed at the perimeter of a network to detect data in transit and alert the network admin based on conditions set

72
New cards

Cloud Based DLP System

Secures data stored in and transmitted through cloud services

73
New cards

Storage DLP

Installed on servers and storage systems, such as file servers, databases, and network-attached storage (NAS) devices. To protect data at rest

74
New cards

Data Owner

Data owners are responsible for the classification, protection, use, and quality of one or more data sets.

75
New cards

Data Controller

Manages the purpose and means by which data is processed

76
New cards

Data Processor

Works under the data controller to assist in tasks like collecting, storing, or analyzing data. Processes the data on behalf of the data controller

77
New cards

Data Custodian

Responsible for data accuracy, privacy, security, and compliance. (System admin)

78
New cards

Symmetric Encryption

Uses a single key for both encryption and decryption of data. The same key must be securely shared and kept secret between the communicating parties. This method is efficient and faster than asymmetric encryption

79
New cards

Asymmetric Encryption

Uses a pair of keys: a public key and a private key. The public key is used to encrypt the data, while the private key is used to decrypt it. The public key can be shared openly, but the private key must be kept secure.

80
New cards

Block Cipher

An encryption algorithm that divides plaintext into fixed-size blocks, typically 64 or 128 bits, and then encrypts each block individually. The same key is used to encrypt and decrypt each block

81
New cards

Stream Cipher

An encryption algorithm that encrypts plaintext one bit or byte at a time using a keystream. Unlike block ciphers, which process fixed-size blocks of data, stream ciphers encrypt data continuously, which can provide faster encryption for real-time communications.

82
New cards

Digital Signature

A cryptographic mechanism used to verify the authenticity and integrity of digital messages or documents. It provides assurance that the message or document was created by a known sender (authentication) and has not been altered since it was signed (integrity).

83
New cards

DH (Diffie-Hellman)

Diffie Hellman - Asymmetric algorithm commonly used for key exchange inside of VPN tunnels

84
New cards

Hashing Algorithms

MD5 (Message Digest Algorithm 5),

SHA-1 (Secure Hash Algorithm 1),

SHA-256 (Secure Hash Algorithm 256),

SHA-3 (Secure Hash Algorithm 3),

RIPEMD (RACE Integrity Primitives Evaluation Message Digest)

85
New cards

PtH

Pass the hash (PtH) is a hacking technique used to authenticate to a remote server or service by using the hashed credentials (password hash) instead of the plaintext password. This method bypasses the need to crack or obtain the actual password and can be used to gain unauthorized access to systems.

86
New cards

Birthday Attack

A type of cryptographic attack that exploits the mathematical probability of collisions in hash functions. It is named after the 'birthday paradox.'

87
New cards

Key Stretching

A technique used in cryptography to enhance the security of passwords or cryptographic keys by increasing the time and computational effort required to derive the original plaintext from its hashed form. This process makes brute-force attacks and other password cracking techniques more difficult and time-consuming.

88
New cards

Salting

A technique used in cryptography to strengthen the security of hashed passwords or other data by adding a random value (known as a salt) to the input before hashing. This random value ensures that even if two users have the same password, their hashed values will differ

89
New cards

Nonce

Number used once is a cryptographic term referring to a random or semi-random number that is generated for a specific purpose, typically to ensure the freshness and uniqueness of data in cryptographic communications or protocols. Nonces are used to prevent replay attacks and to add randomness to cryptographic operations.

90
New cards

Methods to Prevent Hash Related Attacks

Key Stretching, Salting, Nonce

91
New cards

Hash Attack Methods

Pass the Hash attack, Birthday Attack

92
New cards

Digital Signature Algorithms

DSS (Digital Signature Standard),

RSA (Rivest-Shamir-Adleman),

DSA (Digital Signature Algorithm)

93
New cards

Public Key Infrastructure (PKI)

A framework of policies, procedures, and technologies used to manage digital certificates and public-key encryption. It provides a secure and reliable way to verify the authenticity of digital entities (such as users, devices, or servers) on a network.

94
New cards

Certificate Authority (CA)

A trusted entity responsible for issuing digital certificates that authenticate the identity of individuals, organizations, servers, or devices in a public key infrastructure (PKI).

95
New cards

Wildcard Certificates

Secure a domain and all its subdomains using a single certificate. Example, a wildcard certificate issued for *.example.com would secure www.example.com, mail.example.com, etc.

96
New cards

SAN Certificates

Multi-domain certificates secure multiple domain names within a single certificate. They are convenient for organizations managing multiple domains or subdomains.

97
New cards

Registration Authority (RA)

Acts as an intermediary between users (or entities) and a Certificate Authority (CA) in a PKI environment.

98
New cards

CRL

Certificate Revocation List - a list of digital certificates that have been revoked before their scheduled expiration dates.

99
New cards

OCSP

Online Certificate Status Protocol (OCSP) is an Internet protocol used to obtain the current status of a digital certificate in real-time.

100
New cards

PKP

Public Key Pinning (PKP) is a security feature that helps prevent attackers from impersonating a server using fraudulent certificates issued by compromised or rogue certificate authorities. It works by associating a specific cryptographic public key with a particular web server