comptia

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/57

flashcard set

Earn XP

Description and Tags

Other

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

58 Terms

1
New cards

Authentication

Proving you are who you say you are

2
New cards

Authorization

After proving who you are, you need to get access to your data/services

3
New cards

Accounting

Keeping track on who has been authenticated

4
New cards

Data in transit

data going through a network

5
New cards

data in use

any data being actively used in the process

6
New cards

Non-repudiation

A sender cannot deny having sent a message

7
New cards

operational control

security controls implemented by people

8
New cards

managerial control

“a manager decided to do this”

9
New cards

deterrent

security measure to discourage attackers from violating security policies

10
New cards

preventative

measures to prevent security accidents from happening in the first place (proactiveness)

11
New cards

corrective

mitigates the damage that has been done (data backups)

12
New cards

compensating

recognizing shortcomings by implementing alternative measures

13
New cards

directive

a control type to enforce a rule of behavior

14
New cards

Nation State

(skill level, resources, motivation)

High, high, national interests/war/espionage/disruption

15
New cards

Organized Crime

(skill level, resources, motivation)

high, high, money

16
New cards

Hactivists

(skill level, resources, motivation)

moderate, moderate, political/ethics/disruption

17
New cards

Insider Threat

(skill level, resources, motivation)

moderate, low, revenge/blackmail/disruption

18
New cards

Unskilled attacker

(skill level, resources, motivation)

low, low, disruption/prestige

19
New cards

Shadow IT

(skill level, resources, motivation)

low/moderate, low, prestige

20
New cards

Phishing

Email social engineering attack

21
New cards

spoofing

attacker disguises themselves as a trusted source

22
New cards

whaling

attacker targets high profile individuals like CEO

23
New cards

advanced persistent threat

when an attacker gains access to a network and uses it for a long period of time without being detected

24
New cards

dictionary attack

attackers try a predefined list of common password phrases to gain access to an account

25
New cards

password spraying

trying a known good password to the user’s different accounts

26
New cards

birthday attack (cryptographic)

when attackers find two different pieces of data to try to create the same hash (fingerprint)

finding collision usually probabilities

27
New cards

known plaintext attack

when an attacker has access to the plaintext (unencrypted) and their cipher texts (encrypted) so they can figure out the key

28
New cards

known ciphertext attack

attacker knows ciphertext but no access to the plaintext

29
New cards

rainbow table

A rainbow table is a precomputed table of passwords and their hashes that attackers use to quickly find the original password when they have the hash.

30
New cards

Man in the middle attack (on-path)

When an attacker is between two targets, monitoring and intercepting messages that are being sent between them

31
New cards

DNS Poisoning

DNS poisoning is when attackers corrupt a DNS server or its cache to redirect users from a legitimate website to a fake or malicious one, without the user realizing it.

32
New cards

Domain name server

A DNS server is the server that translates a website name (like www.google.com) into its IP address, which tells your computer where the website’s server is located on the internet.

33
New cards

IP

Internet protocol

Unique set of number identifiers that identifies where a device or server is on a network

34
New cards

MAC

A MAC address (Media Access Control address) is a unique identifier assigned to a device’s physical network hardware

35
New cards

ARP Poisoning

ARP poisoning is when the Address Resolution Protocol (ARP) is manipulated so that your device sends data to the attacker’s MAC address instead of the legitimate device

36
New cards

ARP

Address Resolution Protocol

A protocol that matches an IP address to a MAC address on a network

🧠 Why It’s Needed:

  • Devices know IP addresses (like 192.168.1.10),

  • But to actually send data, they need the MAC address of the destination device

That’s where ARP comes in.

37
New cards

denial of service

one person overwhelming a server to where it doesn’t work

38
New cards

distributed denial of service attack

a number of different hosts targeting one target with too much information

39
New cards

application attack (application attack)

When an attacker makes a small request and makes the server send a huge amount of data to the victim to overwhelm and crash the victim’s system.

40
New cards

buffer

block of memory that contains information coming in for our user that is hold for processing

41
New cards

buffer overflow

when a program tries to store more data than the memory can handle, causing the data to spill into nearby memory

42
New cards

virus vs worm

    • Virus = Needs a host file + user action (e.g., clicking)

    • Worm = Spreads on its own, no need for you to do anything

43
New cards

trojan

malware that is hidden in software or is pretending to be something else

44
New cards

back door

hidden way to bypass security measures

45
New cards

remote access trojan

type of trojan allows attacker to have secret remote control over your computer

46
New cards

keyloggers

hardware/software that records the keystrokes of a user

47
New cards

spyware

software that collects all the information that a user is doing on their computer

48
New cards

logic bomb

code that is secretly incorporated into a software and is set to execute when a specific condition is met

49
New cards

cross site request forgery (CSRF)

is when an attacker tricks a user’s browser or a website into performing unwanted actions on a trusted site without the user knowing, by taking advantage of the fact that the user is already logged in.

50
New cards

directory traversal

when an attacker tries to access folders or files outside the intended directory by manipulating the file path (../)

51
New cards

pass the hash

when an attacker uses a stolen password hash to login to a user’s account without needing the actual password

52
New cards

replay attack

when an attacker captures a valid request from website (like a login) and then resends it to trick a system into repeating the same action — without needing your login or permission.

53
New cards

skimming

device is attached to an ATM reader to steal card information

54
New cards

cross site scripting (XSS)

XSS (Cross-Site Scripting) is when a hacker injects malicious code (usually JavaScript) into a trusted website, which then runs in the browsers of other users who visit that site.

55
New cards

Reflected XSS

an attacker injects bad script into a link and when a user clicks on it, the site runs that script

56
New cards

Stored XSS

when a hacker puts bad code into a website and it gets stored in the website database. It then harms other users visit the site, as the code automatically runs in their browser.

57
New cards
58
New cards