CompTIA Security+ TB 3.0 Security Tech And Tools Flashcards

1
Q

Firewall

A

A firewall is a network security device that monitors and controls incoming and outgoing traffic based on predefined rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Intrusion Detection System (IDS)

A

An IDS is a security tool that monitors network traffic and system activities for suspicious patterns or known attack signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Intrusion Prevention System (IPS)

A

An IPS is an advanced version of an IDS that not only detects suspicious activities but also takes automated actions to block and prevent potential threats in real-time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Antivirus/Antimalware Software

A

Antivirus and antimalware software are designed to detect, prevent, and remove malicious software, such as viruses, worms, trojans, and ransomware from systems and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Secure Email Gateway

A

A secure email gateway filters and scans incoming and outgoing emails to detect and block spam, phishing attempts, and malicious attachments or links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Loss Prevention (DLP) Tools

A

DLP tools help organizations identify, monitor, and protect sensitive data to prevent unauthorized access, leakage, or accidental disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption Tools

A

Encryption tools are used to secure sensitive data by converting it into an unreadable format, ensuring confidentiality during transmission and storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virtual Private Network (VPN)

A

VPNs provide encrypted and secure communication over public networks, enabling remote users to access an organization’s resources securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Multi-Factor Authentication (MFA)

A

MFA adds an extra layer of security to user authentication by requiring multiple factors, such as a password and a one-time code sent to a mobile device, to access accounts or systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Web Application Firewall (WAF)

A

A WAF is a security tool that protects web applications by filtering and monitoring HTTP traffic between a web application and the internet. It helps prevent web application attacks, such as SQL injection and cross-site scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Information and Event Management (SIEM)

A

SIEM tools collect and analyze log data from various sources to identify security incidents, correlate events, and provide real-time threat detection and response capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Endpoint Security Solutions

A

Endpoint security solutions protect individual devices, such as computers and smartphones, from malware, unauthorized access, and data breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Penetration Testing Tools

A

Penetration testing tools are used to simulate cyberattacks to identify vulnerabilities in networks, systems, and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network Monitoring Tools

A

Network monitoring tools continuously monitor network traffic, devices, and performance to identify anomalies and potential security issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Identity and Access Management (IAM) Solutions

A

IAM solutions manage user identities, access rights, and permissions to ensure that only authorized users can access specific resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Secure File Transfer Protocol (SFTP)

A

SFTP is a secure version of FTP (File Transfer Protocol) that encrypts data during file transfer, preventing unauthorized access to sensitive data.

17
Q

Security Assessment and Compliance Tools

A

Security assessment and compliance tools help organizations evaluate their adherence to cybersecurity standards and regulations

18
Q

Container Security Tools

A

Container security tools protect containerized applications by detecting vulnerabilities and monitoring container runtime behavior.

19
Q

Mobile Device Management (MDM) Solutions

A

MDM solutions manage and secure mobile devices used by employees, ensuring compliance with security policies and protecting data.

20
Q

Security Awareness Training Platforms

A

Security awareness training platforms offer interactive training modules to educate employees about cybersecurity best practices and threats

21
Q

Incident Response Platforms

A

Incident response platforms help organizations streamline and coordinate incident response efforts during security breaches or cyberattacks

22
Q

Patch Management Tools

A

Patch management tools automate the process of applying software updates and security patches to systems and applications, reducing vulnerability risks

23
Q

Cloud Security Tools

A

Cloud security tools provide additional security layers for cloud environments, protecting data, applications, and infrastructure

24
Q

Behavioral Analytics Tools

A

Behavioral analytics tools analyze user behavior and network activities to detect anomalies and potential insider threats.

25
Q

Secure Web Gateways

A

Secure web gateways protect users from web-based threats by filtering web traffic, URLs, and content.

26
Q

What are the two primary types of Intrusion Detection Technologies?

A
  1. NIDS- Network-Based Intrusion Detection Systems
  2. HIDS: Host-Based Intrusion Detection Systems
27
Q

What is a Network-Based Intrusion Detection System (NIDS)?

A

NIDS monitors network traffic in real-time to detect and respond to potential threats

28
Q

What is a Host-Based Detection System (HIDS)?

A

HIDS monitors and