CompTIA Flashcards

1
Q

A company stores some employee information in encrypted form, but other public details are stored as plaintext.

A

Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

writes data to a temporary location before writing the information to the database. If power is lost, the system can recover the last transaction from this when power is restored.

A

Journaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

high-end cryptographic hardware appliance that can securely store keys and certificates for all devices.

A

HSM (Hardware Security Module)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

used on individual devices to provide cryptographic functions and securely store encryption keys.

A

TPM (Trusted Platform Module)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a file containing a list of the revoked certificates.

A

CRL - Certificate Revocation List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Send the public key to be signed

A

CSR - Certificate Signing Request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

T he browser checks for a revoked certificate

A

OCSP - Online Certificate Status Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authenticate the server sending an email

A

SPF - Sender Policy Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

describes the process of obtaining information from open sources such as social media sites, corporate websites, online forums, and other publicly available locations.

A

OSINT - Open Source Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a vulnerability that allows communication between separate VMs.

A

escape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DKIM

A

Domain Keys Identified Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a broad term describing access control based on a health check or posture assessment. It will deny access to devices that don’t meet the minimum security requirements.

A

NAC - Network Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MTBF

A

Mean Time Between Failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RPO

A

Recovery Point Objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MTTR

A

Mean Time to Repair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RTO

A

Recovery Time Objectives

15
Q

UPS

A

Uninterruptible Power Supply

16
Q

commonly used to create a VPN

A

IPsec

17
Q

WAF

A

Web Application Firewall

commonly used to protect against application attacks such as injections, cross-site scripting, and invalid input types.

18
Q

traps are used to provide alerts and alarms from servers and infrastructure devices

A

SNMP Traps (Simple Network Management Protocol)

19
Q

are large industrial systems and usually involve manufacturing equipment or power generation equipment.

A

ICS (Industrial Control Systems)

20
Q

This process identifies and reports on the hardware and software installed on the laptop. If this configuration is changed, an alert can be generated.

A

enumeration

21
Q

ACL

A

Access Control List

22
Q

ARO

A

Annualized Rate of Occurrence

23
Q

ALE

A

Annual Loss Expectancy

24
Q

SLE

A

Annual Loss Expectancy

25
Q

Directly access cloud-based services from all corporate locations

A

SD-WAN (Software Defined Wide Area Network)

26
Q

This processes provides ongoing building and testing of newly written code

A

Continuous integration

27
Q

located in the control plane and evaluates each access decision based on security policy and other information sources. It determines if access should be granted, denied, or revoked.

A

Policy engine