CompTIA CySA+ CS0-003 Deck 4 Flashcards

Learn key concepts found in the CompTIA CySA+ CS0-003 Exam.

1
Q

Honeypots

A

A host, network, or file set up with the purpose of luring attackers away from assets of actual value and/or discovering attack strategies and weaknesses in the security configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

High-Interaction Honeypots

A

A design to mimic real production systems, making it difficult for attackers to tell the difference between the honeypot and a real system. This aims to capture more detailed attack information than can be accomplished by using a low-interaction honeypot, allowing security teams to understand an attacker better.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Active Decoys

A

A system designed to distract potential attackers away from an organization’s critical systems and data. It creates a false environment that looks like a real system, complete with fake data, applications, and other elements. The decoy system is closely monitored to detect malicious activity and provide early warning and detailed insight into an attacker’s tactics and techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Intrusion Detection Systems

A

A security appliance or software that analyzes data from a packet sniffer to identify traffic that violates policies or rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

System Hardening

A

A process of making a host or app configuration secure by reducing its attack surface, through running only necessary services, installing monitoring software to protect against malware and intrusions, and establishing a maintenance schedule to ensure the system is patched to be secure against software exploits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virtualization

A

A computing environment where multiple independent operating systems can be installed to a single hardware platform and run simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Containers (VM)

A

An operating system virtualization deployment containing everything required to run a service, application, or microservice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Microservices

A

A software architecture where components of the solution are conceived as highly decoupled services not dependent on a single platform type or technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Application Virtualization

A

A software delivery model where the code runs on a server and is streamed to a client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud Deployment

A

Classifying the ownership and management of a cloud as public, private, community, or hybrid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Public cloud

A

Cloud that is deployed for shared use by multiple independent tenants.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Private Cloud

A

Cloud that is deployed for use by a single entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hybrid Cloud

A

Cloud deployment that uses both private and public elements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Serverless

A

A software architecture that runs functions within virtualized runtime containers in a cloud rather than on dedicated server instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(VPC) Virtual Private Cloud

A

A private network segment made available to a single cloud consumer on a public cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(SDN) Software-defined networking

A

APIs and compatible hardware/virtual appliances allowing for programmable network appliances and systems.

17
Q

(SASE) Secure Access Service Edge

A

A networking and security architecture that provides secure access to cloud applications and services while reducing complexity. It combines security services like firewalls, identity and access management, and secure web gateway with networking services such as SD-WAN.

18
Q

In which Linux directory are configuration files typically located?

A

/etc

19
Q

Which type of cloud deployment model is the most common?

A

Hybrid

20
Q

What term describes how many organizations’ networks no longer have a clearly defined “inside” and “outside” boundary?

A

Deperimeterization

21
Q

(2FA)

A

Two-Factor Authentication

22
Q

(2FA) Two-Factor Authentication

A

Strong authentication mechanism that requires a user to submit two different types of credential, such as a fingerprint scan plus PIN. Often, the second credential is transmitted via a second trusted device or account. This is also referred to as 2-step verification.

23
Q

Out-Of-Band Mechanisms

A

Use of a communication channel that is different than the one currently being used.

24
Q

In-band Authentication

A

Use of a communication channel that is the same as the one currently being used.

25
Q

Standalone Server

A

A server that is not integrated into a Microsoft Active Directory domain.

26
Q

(SSO) Single sign-on

A

Authentication technology that enables a user to authenticate once and receive authorizations for multiple services.

27
Q

(PAM)

A

Privileged Access Management

28
Q

(SSO)

A

Single sign-on

29
Q

(PAM) Privileged Access Management

A

Policies, procedures, and support software for managing accounts and credentials with administrative permissions.

30
Q

Federation

A

A process that provides a shared login capability across multiple systems and enterprises. It essentially connects the identity management services of multiple systems.

31
Q

OpenID

A

An identity federation method that enables users to be authenticated on cooperating websites by a third-party authentication service.

32
Q

(SAML)

A

Security Assertion Markup Language

33
Q

(SAML) Security Assertion Markup Language

A

An XML-based data format used to exchange authentication information between a client and a service.

34
Q

(SOAP)

A

Simple Object Access Protocol

35
Q

(SOAP) Simple Object Access Protocol

A

An XML-based web services protocol that is used to exchange messages.