CompTIA Security+ (SY0-601) Flashcards

1
Q

What is Air Gapes?

A

Air gaps involve physically disconnecting a computer or network from any external connections, such as the internet or other networks. This isolation prevents unauthorised access, data exfiltration, and cyberattacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What security benefits do Air Gapes ofter?

A

Air-gapped systems are highly secure because they are not directly accessible from the outside. This makes them resistant to remote attacks like hacking or malware infections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is PGP?

A

Pretty Good Privacy cis an encryption program that provides cryptographic privacy and authentication for data communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Asymmetric encryption?

A

Is a cryptographic technique that uses a pair of mathematically related but distinct keys: a public key and a private key. is known as public-key encryption AES, RC4, and 3DES are all symmetric algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Jumpbox?

A

Jumpbox is a system on a network used to access and manage devices in a separate security zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is TFTP and what port does it use?

A

Trivial File Transfer Protocol uses port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is SMTP and what port does it use?

A

Simple Mail Transfer Protocol uses port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is SMTP and what port does it use?

A

Hypertext Transfer Protocol uses port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is DNS and what port does it use?

A

Domain Name Service protocol uses port 53.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is RIPEMD stand for?

A

RACE Integrity Primitives Evaluation Message Digest.

It was designed to provide secure hashing and message digest capabilities, primarily for use in data integrity and authentication applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is APT?

A

Advanced persistent threat (APT) is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is HTTP and what port does it use?

A

(Hypertext Transfer Protocol) is a fundamental protocol used for transmitting data, particularly on the World Wide Web. It runs on port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is HTTPS and what port does it use?

A

(Hypertext Transfer Protocol Secure) is a secure version of the HTTP (Hypertext Transfer Protocol) used for secure communication over the internet. It runs on port 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is FTP and what port does it use?

A

File Transfer Protocol is a network protocol used for transferring files between a client and a server on a computer network. It runs on port 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is LDAP and what port does it use?

A

Lightweight Directory Access Protocol is a standardized protocol used for accessing and managing directory services. It runs on port 389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is RDP and what port does it use?

A

Remote desktop Protocol runs on port 3389

17
Q

What is SAML and what port does it use?

A

Security assertions markup language (SAML) is an XML-based framework for exchanging security-related information such as user authentication, entitlement, and attributes.

18
Q

What is Twofish and what port does it use?

A

Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits.

19
Q

What is DES and what port does it use?

A

Data Encryption Standard is a symmetric-key algorithm for the encryption of digital data.

20
Q

What is DLP and what port does it use?

A

Data loss prevention products automate the discovery and classification of data types and enforce rules so that data is not viewed or transferred without proper authorization.

21
Q

What is Aircrack-ng?

A

Aircrack-ng is a complete suite of wireless security assessment and exploitation tools that includes monitoring, attacking, testing, and cracking of wireless networks.

22
Q

What is Cross-site scripting?

A

Cross-site scripting (XSS) is one of the most powerful input validation exploits. XSS involves a trusted site, a client browsing the trusted site, and the attacker’s site.

23
Q

What is SOAR?

A

Security Orchestration, Automation, and Response. It is a comprehensive approach to cybersecurity that combines orchestration and automation of security processes with incident response (IR) capabilities.

24
Q
A
25
Q
A
26
Q
A
27
Q
A