CompTIA Security+ 701 Flashcards
AAA (Authentication, Authorization, and Accounting)
a security framework that
ensures only authorized individuals are able to access resources
ABAC (Attribute Based Access Control)
evaluates attributes to determine the
access
ACL (Access Control List)
list of rules that specifies which users or systems are
granted or denied access to a particular object or system resource
AES (Advanced Encryption Standard)
a specification for the encryption of electronic
data established by the U.S National Institute of Standards and Technology (NIST) in
2001. AES is widely used today as it is a much stronger than DES and triple DES
despite being harder to implement
AIS (Automated Indicator Sharing)
service provided by CISA that enables real-time
exchange of machine-readable cyber threat indicators and defensive measures
between public and private sector organizations
APT (Advanced Persistent Threat)
a type of cyber attack in which an unauthorized
user gains access to a system or network and remains undetected for an extended
period of time
ARP (Address Resolution Protocol)
a protocol used to map an IP address to a
physical MAC address
ASLR (Address Space Layout Randomization)
a technique used to prevent
attackers from exploiting vulnerabilities in software by randomizing the location of key
data areas in memory
BCP (Business Continuity Planning)
detailed strategy and set of systems for
ensuring an organization’s ability to prevent or rapidly recover from a significant
disruption to its operations. The plan is essentially a playbook for how any type of
organization—such as a private-sector company, a government agency or a school will
continue its day-to-day business during a disaster scenario or otherwise abnormal
conditions
BDPU Guard (Bridge Protocol Data Units)
BDPU guard is a feature that defends the
layer 2 STP topology against BDPU-related threats
BIA (Business Impact Analysis)
the BIA should identify the operational and financial
impacts resulting from the disruption of business functions and processes
BIOS (Basic Input/Output System)
BIOS, or Basic Input/Output System, is software
stored on a small memory chip, also known as firmware. BIOS is found on the
motherboard. BIOS instructs the computer on how to perform basic functions like
booting and keyboard control; it is also used to identify and configure the hardware in a
computer such as the hard drive, CPU, memory, and related equipment. Finally, it
manages data flow between the computer’s operating system (OS) and attached
devices
BLOB (Binary Large Object Storage)
used by cloud providers as a database for
large amounts of text or binary data
BPA (Business Partnership Agreement)
agreement between 2 companies that are
doing business together in which it is confirmed how much each company should
contribute as well as their responsibility and how the profit will be split
BYOD (Bring Your Own Device)
a policy that allows employees to use their personal
devices, such as smartphones or laptops, to access company resources
CA (Certificate Authority)
trusted entity that issues digital certificates used to verify
the identities of individuals, organizations, websites or devices
CAC (Common Access Card)
smart card about the size of a credit card. It is the
standard identification for Active Duty United States Defense personnel
CASB (Cloud Access Security Broker)
software/hardware that sits between users
and their cloud service to enforce security policies
CAPTCHA (Completely Automated Public Turing test to tell Computers and
Humans Apart)
a challenge-response test used to distinguish between human and
automated users
CBC (Cipher Block Chaining)
a mode of operation for a block cipher – one in which
a sequence of bits are encrypted as a single unit, or block, with a cipher key applied to
the entire block. Cipher block chaining uses what is known as an initialization vector (IV)
of a certain length. By using this along with a single encryption key, organizations and
individuals can safely encrypt and decrypt large amounts of plaintext
CER (Certificate)
security files provided and generated by an Certificate Authority.
These files help a browser to verify if a website is secure and save to enter, verifying its
authenticity. These CER security certificates are usually installed on a web server
CER (Crossover Error Rate)
point where FAR and FRR are equal
CHAP (Challenge Handshake Authentication Protocol)
challenge-response
identity authentication protocol. It depends on a combination of CHAP security
credentials and a “shared secret” between the requestor (client) and the authenticator
(server), and it does not expose a password
CIA (Confidentiality, Integrity, and Availability)
the three core principles of
information security