CompTIA Security+ Vocabulary List Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Active Directory

A

Directory service by Microsoft for Windows domain networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AES (Advanced Encryption Standard)

A

Symmetric encryption algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Application Layer

A

Layer 7 of the OSI model, providing network services to applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anomaly Detection

A

Identifying unusual patterns that do not conform to expected behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attack Surface

A

Total points where an attacker can try to enter data into or extract data from an environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Audit Trail

A

Record of activities to ensure integrity and track changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Biometrics

A

Authentication using physical characteristics, like fingerprints or facial recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication Header (AH)

A

IPsec protocol providing connectionless integrity and data origin authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Black Box Testing

A

Testing without knowledge of the internal workings of the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Blue Team

A

Group responsible for defending an organization from cyber attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bollard

A

Physical security device to prevent vehicle-based attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CCTV (Closed-Circuit Television)

A

Video surveillance system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Compensating Controls

A

Security controls that provide alternative measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Certificate Revocation List (CRL)

A

List of certificates that have been revoked by the Certificate Authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Chain of Custody

A

Documentation showing the seizure, custody, control, transfer, analysis, and disposition of evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ciphertext

A

Encrypted text transformed from plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Confidentiality

A

Ensuring that information is only accessible to those authorized to have access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Control Diversity

A

Using different types of controls (administrative, technical, physical) to achieve security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data-at-Rest

A

Inactive data stored physically in any digital form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data-in-Transit

A

Data actively moving from one location to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Degaussing

A

Process of reducing or eliminating a magnetic field, often used to erase data from magnetic storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Digital Forensics

A

Process of uncovering and interpreting electronic data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Elliptic Curve Cryptography (ECC)

A

Encryption algorithm based on elliptic curves over finite fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Demilitarized Zone (DMZ)

A

Physical or logical subnetwork that contains and exposes an organization’s external-facing services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Dumpster Diving

A

Searching through waste to find confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

EAP (Extensible Authentication Protocol)

A

Framework for transporting authentication protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Evil Twin

A

Rogue wireless access point mimicking a legitimate one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

EMI (Electromagnetic Interference)

A

Disturbance affecting an electrical circuit due to electromagnetic radiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Escrowed Encryption

A

Encryption process where decryption keys are held in escrow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

File Integrity Monitoring

A

Process of validating the integrity of operating system and application software files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Federated Identity Management

A

Linking a user’s electronic identity and attributes, stored across multiple distinct identity management systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Geofencing

A

Creating a virtual boundary for a geographic area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Hashcat

A

Popular password cracking tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Identity Federation

A

Linking a single identity across multiple systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

HIPS (Host-based Intrusion Prevention System)

A

System designed to protect a host from malicious attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Hybrid Attack

A

Combining dictionary and brute-force attacks to crack passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

HIDS (Host-based Intrusion Detection System)

A

System that monitors and analyzes the internals of a computing system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Incident Response Plan

A

Organized approach to addressing and managing the aftermath of a security breach or attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

IDS (Intrusion Detection System)

A

System that monitors network or system activities for malicious activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

IMAP (Internet Message Access Protocol)

A

Protocol used by email clients to retrieve messages from a mail server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Kerberos

A

Network authentication protocol using tickets.

32
Q

IoC (Indicators of Compromise)

A

Artifacts observed on a network or in an operating system that with high confidence indicate a computer intrusion.

33
Q

KDE (Kernel Density Estimation)

A

Non-parametric way to estimate the probability density function of a random variable.

33
Q

Least Privilege

A

Principle of limiting access rights for users to the bare minimum.

33
Q

Key Escrow

A

Secure storage and recovery of encryption keys.

34
Q

IP Spoofing

A

Creating IP packets with a forged source IP address.

35
Q

Logic Bomb

A

Code inserted into a system that sets off a malicious function when specified conditions are met.

35
Q

LDAP (Lightweight Directory Access Protocol)

A

Protocol for accessing and maintaining distributed directory information services.

36
Q

MAC (Mandatory Access Control)

A

Access control policy determined by the system.

36
Q

Mantrap

A

Physical security device that monitors and controls two interlocking doors to a small room.

37
Q

Malware

A

Software intentionally designed to cause damage.

38
Q

MD5 (Message Digest Algorithm 5)

A

Widely used cryptographic hash function.

39
Q

MitM (Man-in-the-Middle)

A

Attack where the attacker secretly intercepts and relays messages.

40
Q

Multi-Tenancy

A

Architecture where a single instance of software serves multiple customers.

41
Q

NAC (Network Access Control)

A

Solutions to define and implement a security policy that grants access to network resources.

42
Q

Non-Repudiation

A

Assurance that someone cannot deny the validity of their actions.

42
Q

Netflow

A

Network protocol for collecting IP traffic information.

42
Q

NIDS (Network Intrusion Detection System)

A

System for monitoring and analyzing network traffic.

43
Q

NTLM (NT LAN Manager)

A

Suite of Microsoft security protocols for authentication.

44
Q

Obfuscation

A

Making something obscure or unclear.

44
Q

OID (Object Identifier)

A

Identifier used to name an object.

45
Q

One-Time Pad

A

Encryption technique that cannot be cracked.

45
Q

OAuth (Open Authorization)

A

Open standard for access delegation.

46
Q

PAP (Password Authentication Protocol)

A

Authentication protocol that uses a two-way handshake.

46
Q

OpenID

A

Decentralized authentication protocol.

46
Q

OWASP (Open Web Application Security Project)

A

Online community creating freely available security-related resources.

47
Q

Pivoting

A

Using one compromised system to attack others.

47
Q

Pharming

A

Redirecting website traffic to another, fraudulent website.

47
Q

PFS (Perfect Forward Secrecy)

A

Property ensuring that the compromise of one session key does not affect others.

48
Q

Red Team

A

Group playing the role of an adversary to test security.

48
Q

Rainbow Table

A

Precomputed table for reversing cryptographic hash functions.

48
Q

Remote Code Execution (RCE)

A

Executing code remotely on a different system.

49
Q

PTZ (Pan-Tilt-Zoom)

A

Camera that can be remotely controlled to pan, tilt, and zoom.

50
Q

Smurf Attack

A

DDoS attack using IP spoofing and ICMP.

50
Q

SOAR (Security Orchestration, Automation, and Response)

A

Stack of compatible software programs enabling security operations teams to streamline and standardize activities.

50
Q

Sandbox

A

Isolated environment for running untrusted programs.

50
Q

Residual Risk

A

Risk remaining after security measures have been applied.

50
Q

SFTP (Secure File Transfer Protocol)

A

Secure version of FTP using SSH.

51
Q

Rogue AP

A

Unauthorized wireless access point.

51
Q

Salting

A

Adding random data to a hash function to ensure unique outputs.

51
Q

SIEM (Security Information and Event Management)

A

Solution for real-time analysis of security alerts.

51
Q

Spear Phishing

A

Targeted phishing attack.

51
Q

Shibboleth

A

Single sign-on (SSO) solution for web resources.

52
Q

SDN (Software-Defined Networking)

A

Network management approach enabling programmatically efficient network configuration.

53
Q

Spyware

A

Software that secretly monitors user activity.

54
Q

Syslog

A

Standard for message logging.

55
Q

Steganography

A

Concealing messages within other non-secret text or data.

56
Q

SYN Flood

A

Attack sending a series of SYN requests to consume resources.

57
Q

Threat Hunting

A

Proactively searching for cyber threats.

57
Q

Tokenization

A

Replacing sensitive data with unique identification symbols.

58
Q

UEBA (User and Entity Behavior Analytics)

A

Analyzing user behavior to detect anomalies.

59
Q

Vishing

A

Phishing conducted through phone calls.

59
Q

Vulnerability Scanner

A

Tool for identifying security weaknesses.

59
Q

XOR Cipher

A

Simple symmetric encryption algorithm.

60
Q

War Driving

A

Searching for Wi-Fi networks by moving around.

61
Q

Worm

A

Self-replicating malware.

62
Q

YARA

A

Tool for identifying and classifying malware.

63
Q

Zero Trust

A

Security concept assuming no implicit trust.

64
Q

Zero-Day Exploit

A

Exploiting a vulnerability that is not yet known to the vendor.

65
Q

Zoning

A

Dividing a storage area network (SAN) into logical segments.