Comptia App Flashcards

1
Q

/etc/shadow file for Linux

A

Contain passwords and is a popular target for brute force attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Air Gap

A

Physical Separation that will require manual transport of files, patches, and other data between 2 environments. Security measure that involves physically isolating a computer or network and preventing it from establishing an external connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Audio Steganography

A

Hiding a secret messages/data into an audio file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bytes/Bits

A

Used in traditional data exchanges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CASB

A

Cloud Access Security Broker
Software tool/service. Acts as a gatekeeper allowing the organization to extend the reach of their security policies into the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CER

A

Cross Error Rate – The point where FAR & the FRR cross over. Provides a means of comparing biometric systems based on efficiently…Lower CER = More desirable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cryptographic Hashes

A

Used for integrity checking of files, network packets, and a variety of other applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CSRF/XSRF (A.K.A.- Session Riding, Sea Surf)

A

Cross Site Request Forgery – takes advantage of the cookies and URL parameters legitimate sites used to help track serve their visitors. Tricks a web browser into executing an unwanted action in an application to which a user is logged in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DHCP

A

Dynamic Host Configuration Protocol
Sniffing or snooping can be enabled to prevent rouge DHCP servers as well as malicious DHCP traffic

Used to automatically assign an Internet Protocol (IP) address to any device on a network so they can communicate using IP

Assigns IP address to your laptop, phone, iPad etc. And when your use Wi-Fi at home the router is a DHCP server

Port 67 (server destination) 68 (client)

https://bluecatnetworks.com/glossary/what-is-dhcp/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DMZ

A

Demilitarized Zone – Perimeter network that protects an organization’s internal local area network (LAN) from untrusted traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ECC

A

Elliptic Curve Cryptography – key-based technique for encrypting data. Small key size but is still very secure
Used a lot in mobile devices. Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Extranet

A

Private networks that allow access to partners or customers but not to the general public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FAR

A

False Acceptance Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Faraday Cage

A

Placed around an area or device to block electromagnetic signals (EMI – Electromagnetic interference)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fileless Virus

A

Type of malicious activity that uses native, legitimate tools built into a system to execute an attack. Uses legitimate programs (PowerShell) to infect a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FRR

A

False Rejection Rate

17
Q

HSM

A

Hardware Security Model - Physical device that acts as a secure crypto processor during the decryption process.

Tamper resistant hardware devices that secure cryptographic processes by generating, protecting, and managing keys used for encrypting and decrypting data and creating digital signatures and certificates

Cryptoprocessor - carries out cryptographic operations

18
Q

IaaS

A

Infrastructure as a Service – Provides essential compute, storage, and networking resources on demand.

Provides virtualized computing resources over the internet

Enables a consumer to outsource computing equipment purchases and running their own data center

19
Q

Intranet

A

Internal service. Part of a network or website only accessible to individuals and systems inside of specific company

20
Q

LDAP

A

Lightweight Directory Access Protocol

Protocol that facilitates directory creation, maintenance, and authentication

Open, vendor-neutral application protocol for accessing and maintaining that data

Client/server protocol used to access and manage directory information

Network repositories of network configuration information such as user accounts, groups…can use the TLS network security protocol.

Port 389…
Port 636 TLS/SSL…Provides encryption by default on this port (LDAPS)

21
Q

MSSP

A

Managed Security Service Provider – Outside company that handles security tasks

Provides SECurity as a Service (SECaaS)

22
Q

Network Load Balancers

A

Network Load Balancers
Distributes traffic among systems. Distributes network traffic across multiple WAN links, virtual machines, or servers to avoid overloading any single host without using complex routing protocols. Can also help monitor system performance, report on issues, and assure loads match the capabilities system

23
Q

PaaS

A

Platform as a Service – Cloud computing where the hardware and software platform is provided by a third party

Enables consumers to rent fully configured systems that are set up for specific purpose

24
Q

Private Cloud

A

On-Premises cloud computing

25
Q

Protected Cable Distribution

A

Wire line or fiber optic system that includes safeguards and countermeasures (e.g., acoustic, electric, electromagnetic, and physical) to permit its use for the transmission of unencrypted information through an area of lesser classification or control

26
Q

Qualitative Risk Assessment

A

Subjective and requires expertise on systems and infrastructure. Cheaper and faster

27
Q

Quantitative Risk Analysis

A

Requires detailed financial data, complex calculations and is time consuming.

Uses ALE (annual loss expectancy) values to prioritize risks

28
Q

Qubits

A

Encryption keys used for quantum key distribution are sent in the form of qubits

29
Q

RADIUS

A

Remote Authentication Dial-In User Service – Provides AAA…802.1x. Centralized authentication

Port 1645/1646 & 1812/1813 (Authentication & Authorization = 1645/1812, Accounting = 1646/1813)

Centralized network authentication server that can be used for network access control (NAC)

Provides centralized authentication services for devices such as Ethernet switches and wireless routers

30
Q

SAN Replication

A

Storage Area Network Replication
Copies the contents of one repository to another repository such as an organization’s central SAN environment to a remote SAN at the hardware or block level

31
Q

SDN

A

Software Defined Network - Usually integrated with your virtualization infrastructure. Enables you to deploy and manage virtual switches, routers, and firewalls virtually, through software

32
Q

SaaS

A

Software as a Service – Supplies a particular application

33
Q

SQL Injection

A

Exploits vulnerability in the code of websites and web apps that allows attackers to hijack back-end processes and access, extract, and delete confidential info from databases….1=1

34
Q

Stateful firewall/Dynamic packet filtering

A

Inspects traffic based on context or state of ALL traffic. Defends based on traffic patterns and flows

35
Q

Stateless firewall

A

Focuses on individual packets, using preset rules to filter traffic. Looks at every packet individually

36
Q

UAV

A

Unmanned Aerial Vehicles (Drones)

37
Q

VM Sprawl

A

Virtual Machine Sprawl – When network has more virtual machines than staff can manage

38
Q

Windows SAM

A

Windows Security Account Manager - Contain passwords and is a popular target for brute force attacks

39
Q

XSS

A

Cross Site Scripting – malicious scripts are injected into otherwise benign and trusted websites