CompTIA A+ Vocabulary List Flashcards
Access Control
Methods to restrict access to resources.
ACL (Access Control List)
A list of permissions attached to an object.
Adware
Software that displays unwanted ads.
Antivirus
Software that detects and removes malware.
APT (Advanced Persistent Threat)
A prolonged and targeted cyberattack.
Authentication
The process of verifying identity.
Authorization
Granting access to resources.
Backup
Copying data to prevent loss.
Botnet
Network of infected devices under a hacker’s control.
Brute Force Attack
Trying many passwords to gain access.
Certificate Authority (CA)
Entity that issues digital certificates.
CIA Triad
Confidentiality, Integrity, and Availability.
Clickjacking
Trick users into clicking on something different from what they perceive.
Cloud Computing
Delivery of services over the internet.
Cross-site Scripting (XSS)
Injecting malicious scripts into webpages.
Cryptography
Securing information through encoding.
Cybersecurity
Protecting systems, networks, and data from attacks.
Data Breach
Unauthorized access to data.
DDoS (Distributed Denial of Service)
Overwhelming a service with traffic.
Digital Signature
A mathematical scheme for verifying authenticity.
Disaster Recovery
Restoring operations after a disaster.
Encryption
Converting information into a secure format.
DNS (Domain Name System)
Translates domain names to IP addresses.
Endpoint
Any device connected to a network.
Hashing
Transforming data into a fixed-size value.
Exploit
Using a vulnerability to execute an attack.
Honeypot
A decoy system to attract attackers.
Firewall
A network security device that monitors traffic.
IDS (Intrusion Detection System)
Monitors for suspicious activity.
IoT (Internet of Things)
Network of interconnected devices.
Keylogger
Software or hardware that records keystrokes.
IPsec (Internet Protocol Security)
A suite for securing IP communications.
Malware
Malicious software designed to harm.
Man-in-the-Middle Attack
Intercepting communication between two parties.
Multi-factor Authentication (MFA)
Using multiple methods for verification.
NAC (Network Access Control)
Enforces security policies on devices.
Enforces security policies on devices.
Dividing a network into smaller parts.
Penetration Testing
Testing security by simulating attacks.
Phishing
Fraudulent attempts to obtain sensitive information.
Proxy Server
Intermediary for requests from clients.