CompTIA A+ 1102 Security Flashcards

1
Q
  • contains a small RFID key
  • contactless
  • replaces a physical key
  • utilizes proximity operationality
A

Key Fobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • provide certificate based authentication
  • requires a smart card reader to authenticate
A

Smart Cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Does bio-metric authentication store an image of your unique bio-metric?

A

no, bio-metric authentication is usually stored as a mathematical representation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • metal detectors
  • provides passive scanning
A

Magnometers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MDM

A

Mobile Device Management (acronym)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

provides centralized management for company owned and user owned devices

A

MDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

rights and permissions should be set to the bare minimum for both user accounts and applications.

A

Rule of Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ACL

A

Access Control Lists (acronym)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • used to allow or deny traffic
  • also used by operating systems
  • commonly used on the ingress or egress of a routing interface
A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Phishing

A
  • social engineering with a touch of spoofing
  • often delivered by email or over text
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vishing

A

Voice Phishing (acronym)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • phishing that occurs over the phone or through voicemail
  • caller ID spoofing is common
A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spear Phishing

A

targeted phishing, using insider information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

spear phishing the CEO of a company

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • uses an authorized person to gain unauthorized access to a building
  • the attacker does not have consent
A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • uses an authorized person to gain unauthorized access to a building
  • unlike tailgating, the attacker does have consent
  • for example, the attacker is holding donuts and asks to have the office door held for them
A

Piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • an attack type that exploits a vulnerability, known to the attackers, but unknown to the application’s/system’s/device’s vendor and support team are aware of it
  • utilizes exploit code
A

Zero-Day Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • also known as a man-in-the-middle attack
  • the attacker sits in between your system and the network, and redirects your traffic
A

On-Path Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ARP

A

Address Resolution Protocol (acronym)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ARP Poisoning

A
  • utilizes spoofing
  • an on-path attack that occurs on the local IP subnet
  • due to ARP’s lack of security features
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • the man-in-the-middle is on the local device, in the browser
  • the attacker uses the advantage of encrypted traffic being so easy to proxy
  • malware, often a trojan horse does all of the proxy work
A

On-Path Browser Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  • represent data as a fixed-length string of test
  • will likely not have a collision (match another hash)
  • makes it impossible to recover an original message from the digest
  • without knowing the hash, the hashing method, etc.
  • SHA-256 is a common hashing method.
  • different operating systems and applications use different hash algorithms.
A

Hashes and Hashing a Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Brute Force Attacks

A
  • a form of password attack where attackers try every single possible password combination, until the password’s hash is matched
  • time consuming
  • also requires a large amount of computing power and resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  • adding your own code into a data stream
  • enabled due to bad programming
  • many different data types
A

Code Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Structured Query Language (acronym)
SQL
26
SQL Injection
- a method of code injection where SQL requests are modified - if you can manipulate an SQL database, then you can control the application
27
XSS
Cross-Site Scripting (acronym)
28
Cross-Site Scripting
- we take information from one website and share it with another - utilizing browser security flaws - one of the most common web application development errors - by using malware that takes advantage of JavaScript
29
Why is Cross-Site Scripting abbreviated as XSS?
though CSS seems like a better acronym for cross-site scripting, it is already utilized for a programming language, used in website design.
30
What are some of the most common programming languages, used for developing websites and web applications? (list)
- JavaScript - provides the interactivity to websites and web applications - HTML - CSS (cascading style sheets) - used for describing the presentation of code, written in a term-30markup language, such as HTML - Java - not related to JavaScript - used to develop web applications, games, and software
31
URL
Uniform Resource Locator (acronym)
32
Non-Persistent (Reflected) Cross-Site Scripting Attacks (steps)
1. the website allows scripts to run inside of user input prompts and text boxes 2. to utilize this design flaw, the attacker emails a link 3. this link runs a script that sends credentials, session IDs, and cookies to the attacker 4. simultaneously, the script embedded in the URL executes in the victim's browser
33
- google.com is an example of a fully qualified domain name. - as seen above, a domain name does not include the protocol, and any subdomains, paths, or file names. - a website URL includes all of these components. - https://www.google.com/search?q=domain+name&sxsrf=ALiCzsYV67... is an example of a URL, and includes the domain name, "google.com", as well as the: - protocol (HTTPS) - subdomain (www) - path (/search?q=domain+name&sxsrf=ALiCzsYV67/) - always ends with "/" - in this example, the URL is shortened due to space constraints (shown by the "..." at the end of the shown URL" - as our web search did not lead us into viewing or opening a file, no file path is included. - an example of a URL with a file path, however, is https://www.google.com/search/file.html - (note that this URL is made-up) - this example's file path is "file.html" ** (note that miranda, the creator of this Quizlet set is currently unsure if the file path of a URL includes the backslashes, or not. however, extensive URL knowlege is not listed in the exam objetives, and therefore, is very unlikely to be on the CompTIA A+ 220-1102 A+ Exam. in the future (after i pass my exam), though, i'll try to remember to further research this, and will edit this term's definition, accordingly :)) ** ** insert image of miranda peace signing for time-keeping purposes, i'm typing this the evening of 8/6/22, with my test scheduled for 8/9/22; let's see how long my update takes! **
URL vs Domain Name (example)
34
URL
a complete web address
35
- malicious code is placed on a centralized server, such as a social media website - inside of a comment, for example - everybody who visits the page or who views the comment gets attacked - no specific target
Persistent (Stored) Cross-Site Scripting Attacks
36
Will disabling JavaScript protect against Cross-Site Scripting attacks?
yes, however, it's not a practical solution
37
SOE
Standard Operating Environment (acronym)
38
- a set of tested and approved hardware/software systems - often a standalone OS image
Standard Operating Environments
39
When does Microsoft release Window's patches?
the second tuesday of every month at 10:00am PST
40
Patch Management (steps)
1. test 2. prioritize 3. deploy
41
- manufacturer stops selling an OS - may continue supporting it, though
EOL Operating Systems
42
EOSL
End of Service Life (acronym)
43
- similar to EOD, but support is no longer available - a costly, premium support option may exist, though
EOSL
44
Windows Defender Antivirus
- built into Windows 10 and Windows 11 - included in the Windows security application - operates in real-time - virus & threat protection settings > manage settings > real-time protection
45
Windows Firewall Exception Rule Types (list)
- program - port - predefined - custom
46
Windows Authentication
- log in using a local account or a Microsoft account or a domain account - Windows domain credentials are SSO
47
NTFS Permissions
- apply from local and network connections - inherited from the parent
48
Share Permissions
- only apply to connections over the network - the most restrictive setting wins
49
Explicit Permissions
- set by us - take precedence over inherited permissions
50
UAC
User Account Control (acronym)
51
- pop-up approval screen - limits user capabilities - secure desktop
User Account Control
52
BitLocker
- encrypts an entire volume - all data, including the OS - not included in Windows Home editions
53
BitLocker To Go
- BitLocker FDE for USB drives - not included in Windows Home editions
54
- encrypt at the file system level - requires NTFS - uses a username and password to encrypt the key - administrative password resets cause EFS files to be inaccessible
EFS
55
- settings > bluetooth & devices > Autoplay - AutoRun on older Windows operating systems
Autoplay
56
Verifying Certificate Details (list)
verify - not expired - domain name - properly signed - date and time
57
locally stored browser data
Cache
58
Unable to Access The Network (Troubleshooting)
- may be due to malware - symptoms: - slow performance and lock up - internet connectivity issues - OS update failures - use malware cleaner or reload from a known good backup
59
- indicates malware - remove or reload from a known good backup
Altered System or Personal Files (Troubleshooting)
60
- malware is the most common cause - best practice is to restore from a known good backup
Browser Redirection (Troubleshooting)