CompTIA Security+ Flashcards

study

1
Q

Confidentiality

A

Ensures that unauthorized individuals are not able to gain access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

ensures that there are no unauthorized modifications to information or systems, either intentionally or unintentionally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

ensures that information and systems are ready to meet the needs of legitimate users at the time those users request them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Nonrepudiation

A

while not part of the CIA triad, is also an important goal of some cybersecurity controls. ________ means that someone who performed some action, such as sending a message, cannot later deny having taken that action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security incidents

A

occur when an organization experiences a breach of the confidentiality, integrity, and/or availability of information or information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Disclosure

A

is the exposure of sensitive information to unauthorized individuals, otherwise known as data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Alteration

A

is the unauthorized modification of information and is a violation of the principle of integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Denial

A

is the disruption of an authorized user’s legitimate access to information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Financial risk

A

is, as the name implies, the risk of monetary damage to the organization as the result of a data breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Reputational risk

A

occurs when the negative publicity surrounding a security breach causes the loss of goodwill among customers, employees, suppliers, and other stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Strategic risk

A

is the risk that an organization will become less effective in meeting its major goals and objectives as a result of the breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Operational risk

A

is risk to the organization’s ability to carry out its day-to-day functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Compliance risk

A

occurs when a security breach causes an organization to run afoul of legal or regulatory requirements. F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Gap Analysis

A

the cybersecurity professional reviews the control objectives for a particular organization, system, or service and then examines the controls designed to achieve those objectives. If there are any cases where the controls do not meet the control objective, that is an example of a ___.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Technical controls

A

enforce confidentiality, integrity, and availability in the digital space. Examples of ________ security controls include firewall rules, access control lists, intrusion prevention systems, and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Operational controls

A

include the processes that we put in place to manage technology in a secure manner. These include user access reviews, log monitoring, and vulnerability management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Managerial controls

A

are procedural mechanisms that focus on the mechanics of the risk management process. Examples of administrative ______ controls include periodic risk assessments, security planning exercises, and the incorporation of security into the organization’s change management, service acquisition, and project management practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Physical controls

A

are security controls that impact the ______ world. Examples of _______ security controls include fences, perimeter lighting, locks, fire suppression systems, and burglar alarms.

19
Q

Preventive controls

A

intend to stop a security issue before it occurs. Firewalls and encryption are examples of _______ controls.

20
Q

Deterrent controls

A

seek to prevent an attacker from attempting to violate security policies. Vicious guard dogs and barbed wire fences are examples of ________ controls.

21
Q

Detective controls

A

identify security events that have already occurred. Intrusion detection systems are ________ controls.

22
Q

Corrective controls

A

remediate security issues that have already occurred. Restoring backups after a ransomware attack is an example of a ______ control.

23
Q

Compensating controls

A

are controls designed to mitigate the risk associated with exceptions made to a security policy.

24
Q

Directive controls

A

inform employees and others what they should do to achieve security objectives. Policies and procedures are examples of _______ controls.

25
Q

Data at rest

A

is stored data that resides on hard drives, tapes, in the cloud, or on other storage media. This data is prone to theft by insiders or external attackers who gain access to systems and are able to browse through their contents.

26
Q

Data in transit

A

is data that is in motion/_____ over a network. When data travels on an untrusted network, it is open to eavesdropping attacks by anyone with access to those networks.

27
Q

Data in use

A

is data that is actively in use by a computer system. This includes the data stored in memory while processing takes place. An attacker with control of the system may be able to read the contents of memory and steal sensitive information.

28
Q

Encryption

A

technology uses mathematical algorithms to protect information from prying eyes, both while it is in transit over a network and while it resides on systems.

29
Q

Data Loss Prevention (DLP)

A

systems help organizations enforce information handling policies and procedures to prevent data loss and theft.

30
Q

DLP systems work in two different environments:

A

NAME?

31
Q

Agent-based DLP

A

-uses software agents installed on systems that search those systems for the presence of sensitive information. These searches often turn up Social Security numbers, credit card numbers, and other sensitive information in the most unlikely places!

32
Q

Agentless (network-based) DLP

A

systems are dedicated devices that sit on the network and monitor outbound network traffic, watching for any transmissions that contain unencrypted sensitive information. They can then block those transmissions, preventing the unsecured loss of sensitive information.

33
Q

DLP systems also have two mechanisms of action:

A

NAME?

34
Q

Pattern matching

A

where they watch for the telltale signs of sensitive information.

35
Q

Watermarking

A

where systems or administrators apply electronic tags to sensitive documents and then the DLP system can monitor systems and networks for unencrypted content containing those tags

36
Q

Hashing

A

uses a _____ function to transform a value in our dataset to a corresponding hash value. If we apply a strong _____ function to a data element, we may replace the value in our file with the ______ value

37
Q

Tokenization

A

replaces sensitive values with a unique identifier using a lookup table. For example, we might replace a widely known value, such as a student ID, with a randomly generated 10-digit number.

38
Q

Masking

A

partially redacts sensitive information by replacing some or all sensitive fields with blank characters.

39
Q

Access restrictions

A

are security measures that limit the ability of individuals or systems to access sensitive information or resources.

40
Q

Two common types of access restrictions:

A

NAME?

41
Q

Geographic restrictions

A

limit access to resources based on the physical location of the user or system.

42
Q

Permission restrictions

A

limit access to resources based on the user’s role or level of authorization.

43
Q

Segmentation

A

places sensitive systems on separate networks where they may communicate with each other but have strict restrictions on their ability to communicate with systems on other networks.

44
Q

Isolation

A

goes a step further and completely cuts a system off from access to or from outside networks.