SecPlusP1 Flashcards
(468 cards)
How many domains does the CompTIA Security+ (SY0-701) certification exam consist of?
Five
What should you be on the lookout for during the exam?
Distractors or red herrings
What is the approach to cybersecurity in the real world?
Situational
What is the definition of information security?
Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction
What is the definition of information systems security?
Protecting the systems (e.g., computers, servers, network devices) that hold and process critical data
What are the three components of the CIA Triad?
Confidentiality, Integrity, Availability
What does confidentiality ensure?
Information is accessible only to authorized personnel (e.g., encryption)
What does integrity ensure?
Data remains accurate and unaltered (e.g., checksums)
What does availability ensure?
Information and resources are accessible when needed (e.g., redundancy measures)
What does non-repudiation guarantee?
An action or event cannot be denied by the involved parties (e.g., digital signatures)
What is an extension of the CIA triad with the addition of non-repudiation and authentication?
CIANA Pentagon
What are the Triple A’s of Security?
Authentication, Authorization, Accounting
What are the four categories of security controls?
Technical, Managerial, Operational, Physical
What are the different types of security controls? (DDDCCP)
Preventative, Deterrent, Detective, Corrective, Compensating, Directive
What principle does the Zero Trust Model operate on?
No one should be trusted by default
What are the two components of achieving zero trust?
Control Plane and Data Plane
What are the components of the Control Plane?
Adaptive identity, threat scope reduction, policy-driven access control, and secured zones
What are the components of the Data Plane?
- Subject/system
- policy engine
- policy administrator
- establishing policy enforcement points (PEP)
What is a threat?
Anything that could cause harm, loss, damage, or compromise to our information technology systems
What are some sources of threats?
Natural disasters, cyber-attacks, data integrity breaches, disclosure of confidential information
What is a vulnerability?
Any weakness in the system design or implementation
What are some internal factors that can create vulnerabilities?
Software bugs, misconfigured software, improperly protected network devices, missing security patches, lack of physical security
Where does the risk to enterprise systems and networks lie?
Where threats and vulnerabilities intersect
What happens if there is a threat but no matching vulnerability?
There is no risk