COMPTIA A+ CORE 2 SECURITY

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 90

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

91 Terms

1

Access control vestibule

• Controls access so only one person can enter at a time

• Prevents tailgating and piggybacking

New cards
2

Badge reader

A machine that reads employee badges and records the time

New cards
3

smart card

Use cards to enter spaces

New cards
4

security guard

a guard who protects a place (not police)

New cards
5

door lock

Type of mechanical lock designed to prevent the opening of a hoist way door from being opened.

New cards
6

Biometric locks

Door and entry locks that are activated by such biometric features as voice; eye retina; fingerprint or signature

New cards
7

Hardware tokens

A small, physical device that you carry with you and use for signing in with 2FA.

New cards
8

Server lock

lock that prohibits access to servers

New cards
9

USB lock

prevents unauthorized USB use

New cards
10

Active Directory

A Windows server directory database and service that is used in managing a domain to allow for a single point of administration for all shared resources on a network, including files, peripheral devices, databases, Web sites, users, and services.

New cards
11

login script

are used to automate actions when users log in

New cards
12

Organizational Units

Are used to group users and devices to simplify management

New cards
13

Home Folder

Private folders users can use to store personal files

New cards
14

folder redirection

is simply a means of storing a copy of certain user profile folders on another computer, usually a file server.

New cards
15

Software tokens

piece of a two-factor authentication security device that may be used to authorize the use of computer services.

New cards
16

Mobile Device Management (MDM)

remotely controls smart phones and tablets, ensuring data security

New cards
17

MAC address filtering

A technique used by a router or wireless access point to allow access to a private network to only certain computers or devices identified by their MAC addresses.

New cards
18

Certificates

Digitally signed electronic documents that bind a public key with a user identity.

New cards
19

Antivirus

software that is specifically designed to detect viruses and protect a computer and files from harm

New cards
20

Anti-malware software

Software designed to stop malware from damaging a computer or network

New cards
21

Firewalls

Determines which processes, protocols, and hosts are allowed to communicate over a network

New cards
22

multifactor authentication (MFA)

An authentication process that requires the client to provide two or more pieces of information. The three categories of authentication factors are knowledge (something you know), possession (something you have), and inherence (something you are).

New cards
23

Access control lists

Object based description of a single resource and the permission each subject

New cards
24

email filtering

service that blocks email messages from designated sources

New cards
25

Principle of Least Privilege

A security discipline that requires that a particular user, system, or application be given no more privilege than necessary to perform its function or job.

New cards
26

WEP (Wired Equivalent Privacy)

Wireless security protocol that uses a standard 40-bit encryption to scramble data packets. Does not provide complete end-to-end encryption and is vulnerable to attack.

New cards
27

Wireless Protected Access (WPA)

Users authenticate using an alphanumeric passphrase (PSK) via TKIP(Temporal Key Integrity Protocol)

Encrypts with RC4 (Rivest Cipher 4)

New cards
28

WPA2 (Wi-Fi Protected Access 2)

A data encryption standard that uses the AES (Advanced Encryption Standard) protocol.

New cards
29

TKIP (Temporal Key Integrity Protocol)

A security protocol created by the IEEE 802.11i task group to replace WEP.

New cards
30

AES (Advanced Encryption Standard)

An encryption standard used by WPA2 and is currently the strongest encryption standard used by Wi-Fi.

New cards
31

Single-factor

In order for Sara, a client, to logon to her desktop computer, she must provide her username, password, and a four digit PIN. Which of the following authentication methods is Sara using?

New cards
32

Multifactor

Using a PIN or password in addition to TPM is an example of what type of authentication?

New cards
33

Remote Authentication Dial-In User Service (RADIUS)

Networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users accessing network resources. Supports various network access scenarios, including Wi-Fi, VPNs, and wired Ethernet connections

New cards
34

TACACS (Terminal Access Controller Access Control System)

is an authentication program used on Unix and Linux based systems, along with certain network routers. Allows a remote access server to communicate with an authentication server and verify if a user has permission to access a network or database.

New cards
35

Ransomware

Software that encrypts programs and data until a ransom is paid to remove it.

New cards
36

Trojan

A program disguised as a harmless application that actually produces harmful results.

New cards
37

Keylogger

A small hardware device or a program that monitors seach keystroke a user types on the computer's keyboard.

New cards
38

Rootkit

Allows an attacker to execute commands at an elevated privilege

New cards
39

Virus

Malware that can self-copy and self- replicate but requires human interaction to spread

New cards
40

Botnet

A logical computer network of zombies under the control of an attacker.

New cards
41

Worm

a software program capable of reproducing itself that can spread from one computer to the next over a network

New cards
42

Spyware

software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.

New cards
43

Recovery Console

Command-line interface boot mode for Windows that is used to repair a Windows XP system suffering from massive OS corruption or other problems.

New cards
44

SecureDNS

was designed to protect applications (and caching resolvers serving those applications) from using forged or manipulated DNS data, such as that created by DNS cache poisoning.

New cards
45

DNS cache poisoning

An exploit in which the DNS database is changed in such as way that a URL no longer connects to the correct Web site

New cards
46

Phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

New cards
47

Spear phishing

a phishing expedition in which the emails are carefully designed to target a particular person or organization

New cards
48

impersonation

An attack that creates a fictitious character and then plays out the role of that person on a victim.

New cards
49

shoulder surfing

Watching an authorized user enter a security code on a keypad.

New cards
50

Tailgating

The act of unauthorized individuals entering a restricted-access building by following an authorized user.

New cards
51

dumpster diving

Involves digging through trash receptacles to find computer manuals, printouts, or password lists that have been thrown away

New cards
52

DDoS (Distributed Denial of Service)

An attack on a computer or network

device in which multiple computers send data and requests to the device in an attempt

to overwhelm it so that it cannot perform normal operations.

New cards
53

Denial of Service (DoS)

attack floods a network or server with service requests to prevent legitimate users' access to the system

New cards
54

Zero-day

An application company sent out a software patch for one of their applications on Monday. The company has been receiving reports about intrusion attacks from their customers on Tuesday. Which of the following attacks does this describe? A. Zero day B. Directory traversal C. Logic bomb D. Session hijacking

New cards
55

Man-in-the-middle

is where someone gets between the sender and receiver of information, sniffing any information sent.

New cards
56

Brute Force

A method for determining a solution to a problem by sequentially testing all possible solutions.

New cards
57

dictionary attack

A password attack that uses a list of known passwords or common words

New cards
58

Rainbow Tables

an attack on a password that uses a large pregenerated data set of hashes from nearly every possible password

New cards
59

Spoofing Attack

A situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.

New cards
60

Non-compliant systems

• A constant challenge - There are always changes and updates

• Standard operating environments (SOE) are a set of tested and

approved hardware/software systems

• Must have OS and application patches to be in compliance

New cards
61

Zombie

a program that secretly takes over another computer for the purpose of launching attacks on other computers

New cards
62

administrator account

User account, created when the OS is first installed, that is allowed complete, unfettered access to the system without restriction.

New cards
63

power user

User who requires the capabilities of a workstation or other powerful computer, typically working with multimedia applications and using industry-specific software.

New cards
64

guest

an anonymous user account that provides access to a computer on a limited or temporary basis

New cards
65

Standard user account

has fewer permissions than an administrative-level account but enough permissions to be productive

New cards
66

File Attributes

The properties assigned to a file. Examples of file attributes are read-only and hidden status.

New cards
67

single sign-on

A gateway service that permits users to log in once with a single user ID and password to gain access to multiple software applications.

New cards
68

EFS (Encrypting File System)

A file-encryption tool available on Windows systems that have partitions formatted with NTFS.

New cards
69

Authenticator applications

The app is pre-set by you to work with the service and provides a constantly rotating set of codes that you use to utilize two-factor authentication or verification.

New cards
70

shredder

a machine that cuts documents into small pieces so that no one can read them

New cards
71

Drive wipe

Process that overwrites all information on a drive so it cannot be retrieved.

New cards
72

Overwrite

The process of replacing an existing file with one that contains changes

New cards
73

Low Level Format

A process that determines the type of encoding to be done on the disk platter and the sequence in which the read/write heads will access stored data.

New cards
74

certificate of destruction

A document that constitutes proof that a health record was destroyed and that includes the method of destruction, the signature of the person responsible for destruction, and inclusive dates for destruction

New cards
75

Port Forwarding/Mapping

Enables remote access to applications or server from outside the network.

New cards
76

Radio power levels

Increasing the radio frequency (RF) signal increases the signal distance from the wireless access point. Decreasing the RF

New cards
77

WPS (Wi-Fi Protected Setup)

A user-friendly—but not very secure—security setting available on some consumer-grade APs. Part of the security involves requiring a PIN in order to access the AP's settings or to associate a new device with the network. The PIN can be easily cracked through a brute force attack, so this PIN feature should be disabled if possible.

New cards
78

Firewall settings

Every device on a network should be protected by a firewall. A firewall can be enabled (when one exists) on a wireless router.

New cards
79

content filtering

occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information

New cards
80

Disabling SSID broadcast:

An SSID can be broadcast by an AP to let users know the name of the WLAN. For security purposes, an AP might be configured not to broadcast its SSID. However, knowledgeable users could still determine the SSID of an AP by examining captured packets.

New cards
81

Changing default SSID

Many default SSID names give away the type of router being used, thus making it vulnerable as default passwords are easily

found online. The SSID name and password should be changed.

New cards
82

WPA3

Latest and most secure version of wireless network encryption currently available

New cards
83

Kerberos

Used on Windows to authenticate users in Active directory

New cards
84

Memory resident viruses

remain in memory while running

New cards
85

Boot sector viruses

reside in the first sector of storage media, which stores boot data

New cards
86

Macro viruses

take advantage of automation features in productivity software and spread through files associated with them

New cards
87

Email viruses

spread either as attachments or scripts that are part of the email

New cards
88

Recovery mode

Microsoft Windows Recovery Environment (Windows RE) is a simplified, scaled-back version of the Windows operating system

New cards
89

Spoofing

a technique an attacker uses to hide their identity

New cards
90

DNS Poisoning

False DNS information

New cards
91

ARP Spoofing

Attacker spoofs the IP to MAC mapping usually to perform a man-in-the-middle attack

New cards

Explore top notes

note Note
studied byStudied by 38 people
910 days ago
4.0(1)
note Note
studied byStudied by 4 people
58 days ago
5.0(1)
note Note
studied byStudied by 72 people
199 days ago
5.0(1)
note Note
studied byStudied by 8 people
954 days ago
5.0(1)
note Note
studied byStudied by 20 people
1006 days ago
4.0(1)
note Note
studied byStudied by 13 people
890 days ago
5.0(1)
note Note
studied byStudied by 34 people
848 days ago
5.0(1)
note Note
studied byStudied by 767 people
708 days ago
4.0(4)

Explore top flashcards

flashcards Flashcard (71)
studied byStudied by 2 people
747 days ago
5.0(1)
flashcards Flashcard (49)
studied byStudied by 3 people
302 days ago
5.0(2)
flashcards Flashcard (27)
studied byStudied by 4 people
828 days ago
5.0(1)
flashcards Flashcard (57)
studied byStudied by 40 people
465 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 34 people
497 days ago
5.0(1)
flashcards Flashcard (25)
studied byStudied by 62 people
793 days ago
5.0(2)
flashcards Flashcard (82)
studied byStudied by 100 people
515 days ago
5.0(1)
flashcards Flashcard (68)
studied byStudied by 97 people
23 days ago
5.0(1)
robot