Comp TIA Security Plus 701 Flashcards

1
Q

Nation States / APT

A

Definition: Highly skilled hackers targeting systems for espionage, data theft, or sabotage.
Example: Cyber espionage against a defense contractor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Script Kiddies

A

Definition: Unskilled hackers using ready-made tools for unauthorized access.
Example: Running a downloaded tool to deface a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hacktivists

A

Definition: Hackers driven by ideological motives, such as political protests.
Example: DDoS attacks on government sites during a political protest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Organized Crime

A

Definition: Hackers seeking financial gain through deliberate, skilled actions.
Example: Stealing credit card data for resale on the dark web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AAA (Authentication, Authorization, and Accounting)

A

Definition: Framework for controlling access and tracking user activities.
Example: Logging into a system with credentials and recording login events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ACL (Access Control List)

A

Definition: A set of rules controlling access to network resources.
Example: Allowing only certain IP addresses to access a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES (Advanced Encryption Standard)

A

Definition: A widely used encryption method for secure data.
Example: Encrypting sensitive corporate files using AES-256.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

APT (Advanced Persistent Threat)

A

Definition: A prolonged attack where intruders remain undetected for extended periods.
Example: A cyber espionage group infiltrating a government agency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPSec (Internet Protocol Security)

A

Definition: A suite of protocols to secure IP communications via encryption and authentication.
Example: Encrypting a VPN connection using IPSec.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TLS (Transport Layer Security)

A

Definition: A protocol ensuring secure communication over a network.
Example: HTTPS websites using TLS to encrypt traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SSH (Secure Shell)

A

Definition: A protocol for secure remote access to devices.
Example: Admins using SSH to configure servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DNS (Domain Name System)

A

Definition: A system that translates human-readable domain names into IP addresses.
Example: www.google.com resolving to an IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Social Media Attacks

A

Definition: Exploiting social media for phishing or malicious activities.
Example: Fake posts with malicious links targeting users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Email Attacks

A

Definition: Using malicious emails to distribute malware or steal credentials.
Example: Phishing emails impersonating a bank to gather account details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cloud Vulnerabilities

A

Definition: Exploiting weaknesses in shared cloud infrastructure.
Example: Breaching a multi-tenant cloud provider to access sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MFA (Multi-factor Authentication)

A

Definition: Security requiring two or more authentication factors.
Example: Logging into a system with both a password and a texted code.

17
Q

IDS (Intrusion Detection System)

A

Definition: A system monitoring network traffic for signs of malicious activity.
Example: Detecting and alerting on unusual login attempts.

18
Q

SIEM (Security Information and Event Management)

A

Definition: A system analyzing security data from across a network to detect threats.
Example: Aggregating firewall logs for suspicious activity detection.

19
Q

RAID (Redundant Array of Independent Disks)

A

Definition: A technology for data redundancy and improved performance.
Example: Using RAID-5 to ensure data remains accessible even if one drive fails.

20
Q

RBAC (Role-Based Access Control)

A

Definition: Permissions are granted based on user roles within an organization.
Example: Giving a database administrator access to manage databases but not HR systems.

21
Q

MAC (Mandatory Access Control)

A

Definition: Access is enforced by the operating system based on predefined rules.
Example: A classified system where only users with a top-secret clearance can view documents.

22
Q

DAC (Discretionary Access Control)

A

Definition: Resource owners set access permissions.
Example: A user sharing a private folder with colleagues.

23
Q

OAuth (Open Authorization)

A

Definition: A protocol for granting third-party access to resources without sharing credentials.
Example: Signing into a web service using your Google or Facebook account.

24
Q

LDAP (Lightweight Directory Access Protocol)

A

Definition: Protocol for accessing and managing directory information over a network.
Example: Authenticating users in an Active Directory environment.

25
Q

SAML (Security Assertion Markup Language)

A

Definition: A standard for exchanging authentication data between systems.
Example: Single sign-on (SSO) between a company’s intranet and a third-party app.

26
Q

TACACS+ (Terminal Access Controller Access-Control System Plus)

A

Definition: Protocol for centralized authentication, authorization, and accounting.
Example: Managing user permissions for network routers.

27
Q

RSA (Rivest-Shamir-Adleman)

A

Definition: A widely used public-key encryption algorithm.
Example: Securing email communications with RSA encryption.

28
Q

ECC (Elliptic Curve Cryptography)

A

Definition: Encryption using elliptic curve math for enhanced security with smaller key sizes.
Example: Securing mobile apps with ECC-based encryption.

29
Q

SHA (Secure Hash Algorithm)

A

Definition: Produces a unique hash value to ensure data integrity.
Example: Verifying downloaded software using a SHA-256 hash.

30
Q

Diffie-Hellman

A

Definition: A key exchange algorithm enabling secure key sharing over public channels.
Example: Establishing an encrypted session between a web browser and server.

31
Q

WAF (Web Application Firewall)

A

Definition: A firewall designed to protect web applications.
Example: Blocking SQL injection attacks on a website’s login page.

32
Q

NGFW (Next-Generation Firewall)

A

Definition: Advanced firewalls with features like application awareness and intrusion prevention.
Example: Detecting malware based on network behavior.

33
Q

VPN (Virtual Private Network)

A

Definition: Creates a secure, encrypted tunnel for internet communication.
Example: A remote employee using a VPN to access company servers securely.

34
Q

Phishing

A

Definition: Fraudulent attempts to obtain sensitive data by impersonating trustworthy entities.
Example: Receiving a fake email from “your bank” asking for account credentials.

35
Q

Spear Phishing

A

Definition: A targeted phishing attack aimed at specific individuals or organizations.
Example: A CEO receiving a fake invoice from what appears to be a trusted vendor.

36
Q

Social Engineering

A

Definition: Manipulating people into divulging confidential information.
Example: Convincing an employee over the phone to reset a password.

37
Q

FDE (Full Disk Encryption)

A

Definition: Encrypts all data on a disk to prevent unauthorized access.
Example: Encrypting a laptop’s hard drive using BitLocker.

38
Q

DLP (Data Loss Prevention)

A

Definition: Tools designed to prevent unauthorized sharing or transmission of sensitive data.
Example: Blocking outgoing emails containing customer credit card numbers.

39
Q

EFS (Encrypting File System)

A

Definition: A Windows feature for encrypting individual files or folders.
Example: Encrypting sensitive files stored on a shared network drive.