Security+ Set A Flashcards

1
Q

AAA (Authentication, Authorization, Accounting)

A

security concept where a centralized platform verifies subject identification, ensures subject is assigned permissions, and then logs these actions to create an audit trail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ABAC (attribute-based access control)

A

an access control technique that evaluates a set of attributes that each subject possesses to determine if access should be granted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ACL (Access Control List)

A

A collection of access control entries (ACEs) that determines which subjects are allowed or denied access to the object and the privileges given.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES (Advanced Encryption Standard)

A

A symmetric 128-, 192-, 256-bit block cipher based on the Rijndael algorithm developed by Belgian cryptographers Joan Daemen and Vincent Rijmen and adopted by the U.S. government as its encryption standard to replace DES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AH (Authentication header)

A

An IPSec protocol that provides authentication for the origin of transmitted data as well as integrity and protection against replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AIS (automated indicator sharing)

A

threat intelligence data feed operated by the DHS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ALE (annual loss expectancy)

A

the total cost of a risk to an organization on an annual basis. This is determined by multiplying the SLE by the annual rate of occurrence (ARO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AP (access point)

A

A device that provides a connection between wireless devices and can connect to wired networks. Also known as wireless access point or WAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

API (application programming interface)

A

A library of programming utilities used, for example, to enable software developers to access functions of the TCP/IP network stack under a particular operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

APT (advanced persistent threat)

A

an attacker’s ability to obtain, maintain, and diversify access to network systems using exploits and malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ARO (annual rate of occurrence)

A

in risk calculation, an expression of the probability/likelihood of a risk as the number of times per year a particular loss is expected to occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARP inspection

A

an optional security feature of a switch that prevents excessive ARP replies from flooding a network segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARP poisoning (ARP spoofing)

A

network based attack where an attacker with access to the target local network segment redirects an IP address to the MAC address of a computer that is not the intended recipient. This can be used to perform a variety of attacks, including DoS, spoofing, and Man-in-the-Middle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge)

A

a knowledge base maintained by the MITRE corporation for listing and explaining specific adversary tactics, techniques, and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Agile model (Agile)

A

A software development model that focuses on iterative and incremental development to account for evolving requirements and expectations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Arduino

A

Open-source platform producing programmable circuit boards for education and industrial prototyping.

17
Q

Autopsy

A

The Sleuth Kit is an open source collection of command line and programming libraries for disk imaging and file analysis. Autopsy is a graphical frontend for these tools and also provides a case managemgent/workflow tool. Also known as Sleuth Kit.

18
Q

account policies

A

set of rules governing user security information, such as password expiration and uniqueness, which can be set globally.

19
Q

active defense

A

the practice of responding to a threat by destroying or deceiving a threat actor’s capabilities.

20
Q

Adversarial AI

A

Using AI to identify vulnerabilities and attack vectors to circumvent security systems.

21
Q

air gap

A

type of network isolation that physically separates a network from all other networks.

22
Q

application aware firewall

A

A layer 7 firewall technology that inspects packets at the application layer of the OSI model.

23
Q

application firewall

A

software designed to run on a server to protect a particular application such as a web server or SQL server.

24
Q

asymmetric algorithm (Public Key)

A

a cipher that uses public and private keys. The keys are mathematically linked, using either Rivel, Shamir, Adleman (RSA) or elliptic curve cryptography (ECC) algorithms, but the private key is not derivable from the public one. An asymmetric key cannot reverse the operation it performs, so the public key cannot decrypt what it has encrypted. Also known as ECC.

25
Q

attack surface

A

the points at which a network or application receives external connections or inputs/outputs that are potential vectors to be exploited by a threat actor.

26
Q

attack vector

A

a specific path by which a threat actor gains unauthorized access to a system. Also known as vector.

27
Q

authenticator

A

a PNAC switch or router that activates EAPoL and passes a supplicant’s authentication data to an authenticating server, such as a RADIUS server.

28
Q

automation

A

using scripts and APIs to provision and deprovision systems without manual intervention.

29
Q

availability

A

the fundamental security goal of ensuring that computer systems operate continuously and that authorized persons can access data that they need.