CompTIA Security+ SY0-701 Last Minute Review

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/16

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts and terminology from the CompTIA Security+ SY0-701 Last Minute Review guide, useful for exam preparation.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

What does CIA stand for in cybersecurity?

Confidentiality, Integrity, and Availability.

2
New cards

What is the primary function of preventive security controls?

To prevent an incident or breach from occurring.

3
New cards

Define what a honeypot is in cybersecurity.

A decoy system or data set up to lure attackers.

4
New cards

What is data encryption?

The process of converting data into a code to prevent unauthorized access.

5
New cards

What does AAA stand for in security terms?

Authentication, Authorization, and Accounting.

6
New cards

What is an Insider Threat?

An individual within an organization who misuses their access to harm the organization.

7
New cards

Explain the concept of zero trust.

A security model that requires strict identity verification for everyone and everything trying to access resources.

8
New cards

What is the goal of incident response?

To manage the aftermath of a security breach or cyberattack to limit damage and reduce recovery time.

9
New cards

What is the purpose of access control lists (ACLs)?

To define who can access a particular resource and what operations they can perform.

10
New cards

Define Risk Appetite.

The level of risk an organization is willing to accept to achieve its objectives.

11
New cards

What is meant by 'Social Engineering' in cybersecurity?

Manipulating individuals into divulging confidential information by exploiting human psychology.

12
New cards

What does DLP stand for?

Data Loss Prevention.

13
New cards

Why is wheel of fortune a metaphor used in change management?

It implies the cycle of change with risk at each turn, emphasizing necessary evaluation.

14
New cards

What are managed service providers (MSPs)?

Companies that remotely manage a customer's IT infrastructure and/or end-user systems.

15
New cards

Define what malware is.

Malicious software designed to harm or exploit computing devices.

16
New cards

What is a Distributed Denial of Service (DDoS) attack?

A cyber-attack that aims to make a machine or network resource unavailable to its intended users by overwhelming it with traffic.

17
New cards

What is meant by segmentation in security?

Dividing a network into smaller segments to isolate data and services for better security.