COMPTIA SEC+ !!

0.0(0)
studied byStudied by 16 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/97

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:15 AM on 4/3/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

98 Terms

1
New cards

Confidentiality

Ensures data is not disclosed to unintended people

2
New cards

Integrity

Ensures data is not tampered with

3
New cards

Availability

Uptime of system to make data accessible

4
New cards

Non-repudiation

Validation of a message’s origin

5
New cards

Security

Protection against danger, damage, loss, and criminal activity

6
New cards

Asset

Value to an individual/organization

7
New cards

Threat

Potential to cause the loss of an asset

8
New cards

Threat Agent

Person/entity attempting to carry out a threat

9
New cards

Vulnerability

Weakness in a system

10
New cards

Exploit

Act/procedure/software taking advantage of a vulnerability

11
New cards

Malware

Software to take over/damage a computer without consent

12
New cards

Virus

Program damaging computer systems and replicating

13
New cards

Worm

Self-replicating malware

14
New cards

Trojan horse

Malicious program disguised as legitimate software

15
New cards

Zombie

Infected computer controlled by a central command center

16
New cards

Botnet

Group of zombie computers controlled centrally

17
New cards

Rootkit

Programs allowing hidden admin access

18
New cards

Logic Bomb

Malware executing under predefined conditions

19
New cards

Spyware

Software intercepting or controlling a user’s computer

20
New cards

Adware

Monitors user preferences and sends matching ads

21
New cards

Ransomware

Denies access until a ransom is paid

22
New cards

Scareware

Deceptive emails to trick users

23
New cards

Crimeware

Malware for identity theft

24
New cards

Social engineering

Attack involving human interaction for access

25
New cards

Footprinting

Gathering info about an organization

26
New cards

Pretexting

Persuading someone with a fake scenario

27
New cards

Elicitation

Extracting info without arousing suspicion

28
New cards

Pharming

Redirecting URL traffic to attacker’s site

29
New cards

Typosquatting

Leading users to URLs due to mistakes

30
New cards

Whaling

Targeting senior executives and high-profile victims

31
New cards

Vishing

Using VoIP for phishing

32
New cards

Spear phishing

Sending personalized emails to victims

33
New cards

Air gap

Physically isolating a network portion

34
New cards

Faraday cage

Blocks electromagnetic emissions

35
New cards

Hardening

Securing devices by reducing security exposure

36
New cards

Hotfix

Quick fix for a specific software problem

37
New cards

Patch

Thoroughly tested fix for wider deployment

38
New cards

Service pack

Collection of patches and enhancements for deployment.

39
New cards

Trusted Operating System/TOS

Operating system hardened and validated to a specific security level, supporting multilevel security where users can't access data at different classification levels.

40
New cards

Security baseline

Part of a configuration baseline ensuring workstations and servers comply with security goals of the organization.

41
New cards

Standard Operating Environment/SOE

Implemented as a standard disk image for deploying new computers, based on TOS and fully patched.

42
New cards

Manage software

Ensuring up-to-date licenses, installing security software, needed software only, avoiding untrusted software, and reducing attack surface by limiting applications and services.

43
New cards

Security zone

Network/system portion with specific security concerns.

44
New cards

Wireless network

Network without physical connections.

45
New cards

Guest network

Provides internet access to guest users with firewall regulation.

46
New cards

Honeynet

Special network to trap potential attackers.

47
New cards

Ad hoc

Decentralized network allowing direct connections between devices.

48
New cards

Intranet zone

Private network using internet services internally.

49
New cards

Internet

Public network with publicly available servers.

50
New cards

Extranet

Privately controlled network between the internet and a private LAN.

51
New cards

Demilitarized zone

Network with publicly accessible resources between private network and untrusted network.

52
New cards

Proxy server

Firewall intermediary between clients and servers.

53
New cards

Internet content filter

Software to monitor and restrict web content.

54
New cards

Network access control

Software controlling network access based on security requirements.

55
New cards

All-in-one security appliance

Device combining multiple security functions.

56
New cards

Application-aware device

Device managing network traffic based on application-layer protocol.

57
New cards

Intelligence Fusion

Sharing information between multiple government agencies and private security firms.

58
New cards

Vulnerability Scan

Process of capturing and analyzing packets to identify security weaknesses in a network, computer system, local applications, or web applications.

59
New cards

Common Vulnerability Scoring System (CVSS)

System that ranks vulnerabilities based on severity.

60
New cards

Security Information and Event Management (SIEM)

Tool that gathers network information and centralizes it for analysis to detect threats.

61
New cards

Security Orchestration, Automation, and Response (SOAR)

Solution stack of compatible software programs that collect and respond to security threats automatically.

62
New cards

Man-In-The-Middle (MITM) Attack

Hacker intercepts communication between two devices.

63
New cards

ARP Poisoning

Attack targeting the ARP protocol where the attacker changes the ARP cache by spoofing the IP address of a target.

64
New cards

MAC Spoofing

Hacker spoofs the MAC address of the gateway to overwrite the gateway’s MAC address in the switch’s CAM table.

65
New cards

MAC Flooding

Attack where the attacker overwhelms a network switch by sending a large number of Ethernet frames with various MAC addresses.

66
New cards

DNS Attack

Attack that targets the Domain Name System service.

67
New cards

Distributed Denial of Service (DDoS)

Attack designed to overwhelm a target with more data than it can handle, causing a shutdown.

68
New cards

Macros

Code used to perform a series of steps or functions within an application.

69
New cards

Brute Force Attack

Password attack where a cracking tool submits every possible combination of letters, numbers, and symbols in a short amount of time.

70
New cards

Password Spraying

Brute force attack that uses the same password across multiple user accounts.

71
New cards

Dictionary Attack

Brute force attack where a hacker uses a list of words or phrases to guess the password.

72
New cards

Rainbow Attack

Attack using special tables with common passwords and generated hashes of each password.

73
New cards

Dumpster Diving

Social engineering attack where an attacker searches through trash to find important documents or information.

74
New cards

Packet Capture

Process of collecting Layer 3 (Network) information over the wire, like IP addresses.

75
New cards

TCPDUMP

Linux tool for collecting packet data for later analysis.

76
New cards

Wireshark

Network protocol analyzer tool.

77
New cards

Secure Shell (SSH)

Remote admin protocol for secure connections to remote systems.

78
New cards

PuTTY

Open-source software supporting various protocols like SSH and Telnet.

79
New cards

Secure Sockets Layer (SSL)

Encryption protocol for secure connections to remote systems.

80
New cards

Public Key Infrastructure (PKI)

System for secure data transmission using key pairs and certificates for verification.

81
New cards

Fault Tolerance

Ability to respond to unexpected hardware/software failures without data loss.

82
New cards

Redundancy

Method for providing fault tolerance by using duplicate or multiple components performing the same function.

83
New cards

Geo Dispersion

Storing data in multiple locations to mitigate downtime due to loss of availability at one location.

84
New cards

Multipath

Fault-tolerance technique providing multiple physical paths between a CPU and a mass-storage device.

85
New cards

Load Balancers

Process distributing processing among multiple nodes.

86
New cards

Uninterrupted Power Supply (UPS)

Stand-alone power supply allowing servers to be gracefully shut down during a power outage.

87
New cards

Active/Active

Two load balancers working together to distribute network traffic.

88
New cards

Active/Passive

Two load balancers with one active and the other in standby mode to take over if the active one fails.

89
New cards

Virtual IP

IP address usable by multiple endpoints, commonly used in failover systems and for load balancing.

90
New cards

Storage Area Network (SAN)

High-speed network of storage devices, typically used for file shares.

91
New cards

Full Backup

Captures all data on a machine, usually the first backup to be run.

92
New cards

Incremental Backup

Contains all changes since the last incremental backup.

93
New cards

Differential Backup

Contains all changes since the last full backup.

94
New cards

Snapshot

Instant copy of an individual computer, often used on virtual machines for reverting changes.

95
New cards

Network Storage Appliance (NAS)

Device used to store backups or other files.

96
New cards

Scalability

Ability to increase or decrease data storage space.

97
New cards

Restoration Order

Pre-planned sequence for restoring servers following a disastrous event based on their importance.

98
New cards

3-2-1 Rule

Backup strategy requiring three copies of each complete backup, two kept on-site on different appliances, and one kept off-site.