CompTIA CySA+ CS0-003 Deck 4 Flashcards
Learn key concepts found in the CompTIA CySA+ CS0-003 Exam.
Honeypots
A host, network, or file set up with the purpose of luring attackers away from assets of actual value and/or discovering attack strategies and weaknesses in the security configuration.
High-Interaction Honeypots
A design to mimic real production systems, making it difficult for attackers to tell the difference between the honeypot and a real system. This aims to capture more detailed attack information than can be accomplished by using a low-interaction honeypot, allowing security teams to understand an attacker better.
Active Decoys
A system designed to distract potential attackers away from an organization’s critical systems and data. It creates a false environment that looks like a real system, complete with fake data, applications, and other elements. The decoy system is closely monitored to detect malicious activity and provide early warning and detailed insight into an attacker’s tactics and techniques.
Intrusion Detection Systems
A security appliance or software that analyzes data from a packet sniffer to identify traffic that violates policies or rules.
System Hardening
A process of making a host or app configuration secure by reducing its attack surface, through running only necessary services, installing monitoring software to protect against malware and intrusions, and establishing a maintenance schedule to ensure the system is patched to be secure against software exploits.
Virtualization
A computing environment where multiple independent operating systems can be installed to a single hardware platform and run simultaneously.
Containers (VM)
An operating system virtualization deployment containing everything required to run a service, application, or microservice.
Microservices
A software architecture where components of the solution are conceived as highly decoupled services not dependent on a single platform type or technology.
Application Virtualization
A software delivery model where the code runs on a server and is streamed to a client.
Cloud Deployment
Classifying the ownership and management of a cloud as public, private, community, or hybrid.
Public cloud
Cloud that is deployed for shared use by multiple independent tenants.
Private Cloud
Cloud that is deployed for use by a single entity.
Hybrid Cloud
Cloud deployment that uses both private and public elements.
Serverless
A software architecture that runs functions within virtualized runtime containers in a cloud rather than on dedicated server instances.
(VPC) Virtual Private Cloud
A private network segment made available to a single cloud consumer on a public cloud.
(SDN) Software-defined networking
APIs and compatible hardware/virtual appliances allowing for programmable network appliances and systems.
(SASE) Secure Access Service Edge
A networking and security architecture that provides secure access to cloud applications and services while reducing complexity. It combines security services like firewalls, identity and access management, and secure web gateway with networking services such as SD-WAN.
In which Linux directory are configuration files typically located?
/etc
Which type of cloud deployment model is the most common?
Hybrid
What term describes how many organizations’ networks no longer have a clearly defined “inside” and “outside” boundary?
Deperimeterization
(2FA)
Two-Factor Authentication
(2FA) Two-Factor Authentication
Strong authentication mechanism that requires a user to submit two different types of credential, such as a fingerprint scan plus PIN. Often, the second credential is transmitted via a second trusted device or account. This is also referred to as 2-step verification.
Out-Of-Band Mechanisms
Use of a communication channel that is different than the one currently being used.
In-band Authentication
Use of a communication channel that is the same as the one currently being used.
Standalone Server
A server that is not integrated into a Microsoft Active Directory domain.
(SSO) Single sign-on
Authentication technology that enables a user to authenticate once and receive authorizations for multiple services.
(PAM)
Privileged Access Management
(SSO)
Single sign-on
(PAM) Privileged Access Management
Policies, procedures, and support software for managing accounts and credentials with administrative permissions.
Federation
A process that provides a shared login capability across multiple systems and enterprises. It essentially connects the identity management services of multiple systems.
OpenID
An identity federation method that enables users to be authenticated on cooperating websites by a third-party authentication service.
(SAML)
Security Assertion Markup Language
(SAML) Security Assertion Markup Language
An XML-based data format used to exchange authentication information between a client and a service.
(SOAP)
Simple Object Access Protocol
(SOAP) Simple Object Access Protocol
An XML-based web services protocol that is used to exchange messages.