CompTIA_Security__Complete_Study_Guide_Exam_SY0-701-20-47

studied byStudied by 1 person
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 19

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

20 Terms

1
What are security controls and their primary role?
Security controls are mechanisms, policies, or procedures that help protect an organization’s assets and data by reducing the risk landscape through prevention, detection, or mitigation of potential threats.
New cards
2
What are the four main categories of security controls?
Technical, managerial, operational, and physical.
New cards
3
Give examples of technical controls.
Firewalls, intrusion detection systems (IDS), and encryption.
New cards
4
What is a preventive control?
Preventive controls aim to stop an event or action from occurring; examples include firewalls and strong authentication methods.
New cards
5
What is the main purpose of deterrent controls?
Deterrent controls aim to discourage a potential attacker; for example, warning signs that indicate surveillance.
New cards
6
Define detective controls.
Detective controls are mechanisms that identify unwanted activities or issues, such as system monitoring and auditing.
New cards
7
What do corrective controls aim to do?
Corrective controls aim to rectify or lessen the damage caused by a security incident.
New cards
8
What are compensating controls?
Compensating controls are secondary controls implemented as interim measures when primary controls cannot be applied for technical or business reasons.
New cards
9
What are the principles of the CIA triad?
Confidentiality, integrity, and availability.
New cards
10
Explain the concept of non-repudiation.
Non-repudiation provides assurance that a specific operation or transaction has occurred and was initiated by a particular entity.
New cards
11
What does AAA stand for in security?
Authentication, Authorization, and Accounting.
New cards
12
Describe a gap analysis in cybersecurity.
Gap analysis identifies the discrepancies between the current security posture and the desired security posture.
New cards
13
What is the Zero Trust model?
The Zero Trust model assumes no trust by default, even for systems inside the network perimeter.
New cards
14
Define insider threat.
An insider threat comes from individuals within the organization who have access to sensitive information and may misuse it.
New cards
15
What role do hardware security modules (HSM) serve?
HSMs are physical devices that safeguard digital keys and perform cryptographic operations.
New cards
16
What is PKI in cybersecurity?
Public Key Infrastructure (PKI) is a framework for creating, managing, distributing, and revoking digital certificates.
New cards
17
What is the purpose of version control in change management?
Version control helps document changes, who made them, and when they were made, aiding auditing and rollback capabilities.
New cards
18
What is the difference between public key and private key?
The public key is used for encrypting data and can be shared openly, while the private key is kept secret and used to decrypt the data.
New cards
19
What are the motivations behind hacktivism?
Hacktivism is motivated by social or political agendas, often targeting institutions considered oppressive or corrupt.
New cards
20
Identify a motivation commonly associated with organized crime.
Financial gain through methods like ransomware and data theft.
New cards

Explore top notes

note Note
studied byStudied by 10 people
752 days ago
5.0(1)
note Note
studied byStudied by 8 people
909 days ago
5.0(1)
note Note
studied byStudied by 56 people
899 days ago
5.0(1)
note Note
studied byStudied by 30 people
974 days ago
4.0(1)
note Note
studied byStudied by 1114 people
680 days ago
4.0(6)
note Note
studied byStudied by 58 people
1065 days ago
5.0(1)
note Note
studied byStudied by 6 people
760 days ago
5.0(1)
note Note
studied byStudied by 139196 people
332 days ago
4.8(594)

Explore top flashcards

flashcards Flashcard (49)
studied byStudied by 111 people
543 days ago
4.8(4)
flashcards Flashcard (138)
studied byStudied by 201 people
870 days ago
5.0(4)
flashcards Flashcard (40)
studied byStudied by 21 people
554 days ago
5.0(2)
flashcards Flashcard (60)
studied byStudied by 7 people
15 days ago
5.0(1)
flashcards Flashcard (63)
studied byStudied by 3 people
739 days ago
5.0(1)
flashcards Flashcard (36)
studied byStudied by 30 people
550 days ago
5.0(4)
flashcards Flashcard (28)
studied byStudied by 2 people
729 days ago
5.0(1)
flashcards Flashcard (46)
studied byStudied by 232 people
69 days ago
5.0(1)
robot