CompTIA_Security+_Corrected_Flashcards

1
Q

What are the three core security principles in CIA?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the types of security controls?

A

Technical, Managerial, Operational, Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is PKI in cryptographic solutions?

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are common types of cryptographic algorithms?

A

Asymmetric, Symmetric, Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are examples of encryption levels?

A

Full-disk, Partition, File, Volume, Database, Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are common social engineering attack types?

A

Phishing, Vishing, Smishing, Pretexting, Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the key risk management strategies?

A

Transfer, Accept, Avoid, Mitigate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a SIEM tool used for?

A

Security Information and Event Management for monitoring and alerting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the elements of effective security governance?

A

Guidelines, Policies, Standards, Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of hashing in security?

A

Ensures data integrity by producing a unique hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are examples of preventive security controls?

A

Firewall, Antivirus software, Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of a Business Continuity Plan (BCP)?

A

To ensure ongoing business operations during disruptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Cold Site in disaster recovery?

A

A backup facility without IT infrastructure, requiring setup before use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Hot Site in disaster recovery?

A

A fully equipped facility that can take over immediately in case of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a VPN used for?

A

Establishing secure communication over public networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are examples of access control models?

A

MAC, DAC, RBAC, ABAC

17
Q

What is a Subject?

A

Abstractly, an active entity, generally in the form of a person, process, or device, that causes
information to flow among objects or changes the system state of the machine.

18
Q

What are some examples of a Subject?

A

Artificial Intelligence Agent, End User, Computer Program, Script

19
Q

What is the data state model and what are the three possible divisions?

A

The data state model is a theory that categories data into one of three possible divisions of potential data interaction.
Data-in-transit state: data currently being passed between systems
Data-at-rest state: data that is currently being stored
Data-in-use state: data that is currently being processed within the system