CompTIA Flashcards

1
Q

A company stores some employee information in encrypted form, but other public details are stored as plaintext.

A

Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

writes data to a temporary location before writing the information to the database. If power is lost, the system can recover the last transaction from this when power is restored.

A

Journaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

high-end cryptographic hardware appliance that can securely store keys and certificates for all devices.

A

HSM (Hardware Security Module)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

used on individual devices to provide cryptographic functions and securely store encryption keys.

A

TPM (Trusted Platform Module)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a file containing a list of the revoked certificates.

A

CRL - Certificate Revocation List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Send the public key to be signed

A

CSR - Certificate Signing Request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

T he browser checks for a revoked certificate

A

OCSP - Online Certificate Status Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authenticate the server sending an email

A

SPF - Sender Policy Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

describes the process of obtaining information from open sources such as social media sites, corporate websites, online forums, and other publicly available locations.

A

OSINT - Open Source Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a vulnerability that allows communication between separate VMs.

A

escape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DKIM

A

Domain Keys Identified Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a broad term describing access control based on a health check or posture assessment. It will deny access to devices that don’t meet the minimum security requirements.

A

NAC - Network Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MTBF

A

Mean Time Between Failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RPO

A

Recovery Point Objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MTTR

A

Mean Time to Repair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RTO

A

Recovery Time Objectives

15
Q

UPS

A

Uninterruptible Power Supply

16
Q

commonly used to create a VPN

17
Q

WAF

A

Web Application Firewall

commonly used to protect against application attacks such as injections, cross-site scripting, and invalid input types.

18
Q

traps are used to provide alerts and alarms from servers and infrastructure devices

A

SNMP Traps (Simple Network Management Protocol)

19
Q

are large industrial systems and usually involve manufacturing equipment or power generation equipment.

A

ICS (Industrial Control Systems)

20
Q

This process identifies and reports on the hardware and software installed on the laptop. If this configuration is changed, an alert can be generated.

A

enumeration

21
Q

ACL

A

Access Control List

22
Q

ARO

A

Annualized Rate of Occurrence

23
ALE
Annual Loss Expectancy
24
SLE
Annual Loss Expectancy
25
Directly access cloud-based services from all corporate locations
SD-WAN (Software Defined Wide Area Network)
26
This processes provides ongoing building and testing of newly written code
Continuous integration
27
located in the control plane and evaluates each access decision based on security policy and other information sources. It determines if access should be granted, denied, or revoked.
Policy engine