CompTIA_Security+_Corrected_Flashcards
What are the three core security principles in CIA?
Confidentiality, Integrity, Availability
What are the types of security controls?
Technical, Managerial, Operational, Physical
What is PKI in cryptographic solutions?
Public Key Infrastructure
What are common types of cryptographic algorithms?
Asymmetric, Symmetric, Hashing
What are examples of encryption levels?
Full-disk, Partition, File, Volume, Database, Record
What are common social engineering attack types?
Phishing, Vishing, Smishing, Pretexting, Impersonation
What are the key risk management strategies?
Transfer, Accept, Avoid, Mitigate
What is a SIEM tool used for?
Security Information and Event Management for monitoring and alerting
What are the elements of effective security governance?
Guidelines, Policies, Standards, Procedures
What is the purpose of hashing in security?
Ensures data integrity by producing a unique hash value
What are examples of preventive security controls?
Firewall, Antivirus software, Encryption
What is the purpose of a Business Continuity Plan (BCP)?
To ensure ongoing business operations during disruptions
What is a Cold Site in disaster recovery?
A backup facility without IT infrastructure, requiring setup before use
What is a Hot Site in disaster recovery?
A fully equipped facility that can take over immediately in case of failure
What is a VPN used for?
Establishing secure communication over public networks
What are examples of access control models?
MAC, DAC, RBAC, ABAC
What is a Subject?
Abstractly, an active entity, generally in the form of a person, process, or device, that causes
information to flow among objects or changes the system state of the machine.
What are some examples of a Subject?
Artificial Intelligence Agent, End User, Computer Program, Script
What is the data state model and what are the three possible divisions?
The data state model is a theory that categories data into one of three possible divisions of potential data interaction.
Data-in-transit state: data currently being passed between systems
Data-at-rest state: data that is currently being stored
Data-in-use state: data that is currently being processed within the system