Security+ Flashcards
A server that acts as a central repository of all the user accounts and their associated passwords for the network
Domain Controller
Occurs when an attacker modifies the host file to have the client bypass the DNS server and redirects them to an incorrect or malicious website
Altered Hosts File
Certain operations that should only be performed once or not at all, such as initializing a memory location
Atomic Execution
A multi-platform log management tool that helps to easily identify security risks, policy breaches or analyze operational problems in server logs, operation system logs and application logs
nxlog - nxlog is a cross-platform, open-source tool that is similar to rsyslog or syslog-ng
Process where each user’s rights and permissions are revalidated to ensure they are correct
User Access Recertification
Conducted between two business partners that establishes the
conditions of their relationship
Business Partnership Agreement (BPA)
Fire suppression system that relies upon gas (HALON, FM-200, or CO2) instead of water to extinguish a fire
Clean Agent System - If you hear a loud alarm in the server room… GET OUT!
A one-way cryptographic function which takes an input and produces a unique message digest
Hash - Instantly match integrity and hashing on the exam
A tool to transfer data from or to a server, using one of the supported protocols (HTTP, HTTPS, FTP, FTPS, SCP, SFTP, TFTP, DICT, TELNET, LDAP, FILE)
[curl]
The access control policy is determined by the owner
Discretionary Access Control (DAC)
1. Every object in a system must have an owner
2. Each owner determines access rights and permissions for each
object
Malware is placed on a website that you know your potential victims will access
Watering Holes
A senior (executive) role with ultimate responsibility for maintaining the confidentiality, integrity and availability of the information asset
Data Owner - The data owner is responsible for labeling the asset and ensuring that it is protected with appropriate controls
Cloud Threats - Insecure Application Programming Interface (API)
An API must only be used over an encrypted channel (HTTPS). Data received by an API must pass service-side validation routines. Implement throttling/rate-limiting mechanisms to protect from a DoS
Occurs when an attacker is able to execute or run commands
on a remote computer
Remote Code Execution (RCE)
A communications network designed to implement an industrial control system rather than data networking
Operational Technology (OT)
A security component in Windows that keeps every user in standard user mode instead of acting like an administrative user
User Account Control (UAC)
1. Eliminates unnecessary admin-level requests for Windows resources
2. Reduces risk of malware using admin-level privileges to cause system
issues
Provides redundancy by striping data and parity data across the disk drives
RAID 5
Storage device that performs whole disk encryption by using embedded hardware
Self-Encrypting Drive (SED)
Program in Linux that is used to change the permissions or rights of a file or folder using a shorthand number system
chmod
R (Read) = 4
W (Write) = 2
X (Execute) = 1
# chmod 760 filename
7 = Owner can RWX
6 = Group can RW
0 = All Users (no access)
Contents of a virtual machine that exist as deleted files on a cloud-based server after deprovisioning of a virtual machine
Data Remnants
Resources and costs are shared among several different organizations who have common service needs
Community Cloud
Encryption algorithm where different keys are used to encrypt and decrypt the data
Asymmetric Encryption (Public Key) - Diffie-Hellman, RSA, and ECC
A solution that provides real-time or near-real-time analysis of security alerts generated by network hardware and applications
Security Information and Event Management (SIEM)
A technique that is used to mitigate a weaker key by increasing the time needed to crack it
Key Stretching - WPA, WPA2, PGP, bcrypt, and other algorithms utilize key stretching