CompTIA A+ Vocabulary List Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Access Control

A

Methods to restrict access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL (Access Control List)

A

A list of permissions attached to an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Adware

A

Software that displays unwanted ads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Antivirus

A

Software that detects and removes malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

APT (Advanced Persistent Threat)

A

A prolonged and targeted cyberattack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authentication

A

The process of verifying identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authorization

A

Granting access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Backup

A

Copying data to prevent loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Botnet

A

Network of infected devices under a hacker’s control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Brute Force Attack

A

Trying many passwords to gain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Certificate Authority (CA)

A

Entity that issues digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CIA Triad

A

Confidentiality, Integrity, and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Clickjacking

A

Trick users into clicking on something different from what they perceive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cloud Computing

A

Delivery of services over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cross-site Scripting (XSS)

A

Injecting malicious scripts into webpages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cryptography

A

Securing information through encoding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cybersecurity

A

Protecting systems, networks, and data from attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data Breach

A

Unauthorized access to data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DDoS (Distributed Denial of Service)

A

Overwhelming a service with traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Digital Signature

A

A mathematical scheme for verifying authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Disaster Recovery

A

Restoring operations after a disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Encryption

A

Converting information into a secure format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DNS (Domain Name System)

A

Translates domain names to IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Endpoint

A

Any device connected to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Hashing

A

Transforming data into a fixed-size value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Exploit

A

Using a vulnerability to execute an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Honeypot

A

A decoy system to attract attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Firewall

A

A network security device that monitors traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

IDS (Intrusion Detection System)

A

Monitors for suspicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

IoT (Internet of Things)

A

Network of interconnected devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Keylogger

A

Software or hardware that records keystrokes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

IPsec (Internet Protocol Security)

A

A suite for securing IP communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Malware

A

Malicious software designed to harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Man-in-the-Middle Attack

A

Intercepting communication between two parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Multi-factor Authentication (MFA)

A

Using multiple methods for verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

NAC (Network Access Control)

A

Enforces security policies on devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Enforces security policies on devices.

A

Dividing a network into smaller parts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Penetration Testing

A

Testing security by simulating attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Phishing

A

Fraudulent attempts to obtain sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Proxy Server

A

Intermediary for requests from clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Public Key Infrastructure (PKI)

A

A framework for managing digital keys and certificates.

37
Q

Rootkit

A

Software designed to hide the existence of certain processes.

37
Q

Ransomware

A

Malware that encrypts files and demands payment.

38
Q

Sandboxing

A

Running code in an isolated environment.

39
Q

Secure Socket Layer (SSL)

A

Protocol for encrypting internet traffic.

40
Q

SIEM (Security Information and Event Management)

A

Tools for analyzing security data.

41
Q

Social Engineering

A

Manipulating people into divulging information.

42
Q

Spam

A

Unsolicited messages, often containing malware.

43
Q

Spyware

A

Software that secretly monitors user activity.

44
Q

SQL Injection

A

Inserting malicious SQL queries.

45
Q

Trojan Horse

A

Malicious software disguised as legitimate.

46
Q

Two-Factor Authentication (2FA)

A

Using two methods to verify identity.

47
Q

VPN (Virtual Private Network)

A

Creates a secure connection over the internet.

48
Q

Zero-Day Exploit

A

Exploiting a previously unknown vulnerability.

48
Q

Vulnerability

A

A weakness that can be exploited.

49
Q

Whitelist

A

List of approved entities.

50
Q

Backdoor

A

Hidden method to bypass security.

50
Q

Worm

A

Malware that replicates itself to spread.

51
Q

Breach

A

Unauthorized access to data or systems.

52
Q

Cipher

A

Algorithm for performing encryption or decryption.

53
Q

Cold Site

A

Backup site that is not immediately operational.

54
Q

Cookie

A

Small data file used to store information.

55
Q

Credential Stuffing

A

Using stolen credentials to gain access.

56
Q

Data Encryption

A

Converting data into a secure format.

57
Q

Decryption

A

Converting encrypted data back to its original form.

58
Q

Directory Traversal

A

Exploiting a web server to access files.

59
Q

Domain Hijacking

A

Taking control of a domain name.

60
Q

Escalation of Privileges

A

Gaining higher access than intended.

60
Q

Eavesdropping

A

Intercepting private communications.

60
Q

Incident Response

A

Handling security breaches.

61
Q

False Positive

A

Incorrectly identifying benign activity as malicious.

62
Q

Hash Function

A

Algorithm that maps data to a fixed size.

63
Q

Injection

A

Malicious code execution by manipulating input.

64
Q

Integrity

A

Ensuring data is accurate and unchanged.

65
Q

Key Exchange

A

Sharing cryptographic keys securely.

66
Q

IP Spoofing

A

Faking an IP address to impersonate another device.

67
Q

Key Management

A

Handling cryptographic keys securely.

68
Q

Least Privilege

A

Limiting access to only what is necessary.

69
Q

Load Balancer

A

Distributing network traffic across multiple servers.

70
Q

MAC Address

A

Unique identifier for network interfaces.

71
Q

Malvertising

A

Using online ads to spread malware.

72
Q

Message Authentication Code (MAC)

A

Ensuring message integrity.

73
Q

Patch Management

A

Updating software to fix vulnerabilities.

74
Q

Password Cracking

A

Recovering passwords from data.

75
Q

Plaintext

A

Unencrypted information.

76
Q

Polymorphic Malware

A

Malware that changes to evade detection.

77
Q

Rogue Access Point

A

Unauthorized wireless access point.

78
Q

Session Hijacking

A

Taking over a session between a client and server.

79
Q

Spear Phishing

A

Targeted phishing attack.

80
Q

Spoofing

A

Faking an identity or source.

81
Q

Steganography

A

Hiding data within other data.

82
Q

Surveillance

A

Monitoring activities or communications.

83
Q

Symmetric Encryption

A

Using the same key for encryption and decryption.

84
Q

Threat Actor

A

Entity responsible for an attack.

85
Q

Tokenization

A

Replacing sensitive data with tokens.

86
Q

Traffic Analysis

A

Monitoring and analyzing network traffic.

87
Q

URL Filtering

A

Blocking access to specific URLs.

88
Q

User Behavior Analytics (UBA)

A

Analyzing user behavior for threats.

89
Q

Virtualization

A

Creating virtual versions of resources.

90
Q

Wireless Security

A

Protecting wireless networks from threats.