CompTIA CySA+ CS0-003 Deck 5 Flashcards

Learn key concepts found in the CompTIA CySA+ CS0-003 Exam.

1
Q

Shibboleth

A

An identity federation method that provides single sign-on capabilities and enables websites to make informed authorization decisions for access to protected online resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trust Model

A

In PKI, a description of how users and different CAs exchange information and certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(CASB)

A

Cloud Access Security Broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(CASB) Cloud Access Security Broker

A

Enterprise management software designed to mediate access to cloud services by users across all types of devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Forward proxy

A

A server that mediates the communications between a client and another server. It can filter and often modify communications as well as provide caching services to improve performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Reverse proxy

A

A type of proxy server that protects servers from direct contact with client requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(DLP)

A

Data loss prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(DLP) Data loss prevention

A

A software solution that detects and prevents sensitive information from being stored on unauthorized systems or transmitted over unauthorized networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(PII)

A

Personally Identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(PII) Personally Identifiable Information

A

Data that can be used to identify or contact an individual (or, in the case of identity theft, to impersonate them).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(PHI)

A

Protected Health Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(PHI) Protected Health Information

A

Data that can be used to identify an individual and includes information about past, present, or future health, as well as related payments and data used in the operation of a healthcare business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(PIFI)

A

Personal Identifiable Financial Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(PIFI) Personal Identifiable Financial Information

A

Personal information about a consumer provided to a financial institution that can include account number, credit/debit card number, name, social security number and other information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(CHD)

A

Cardholder data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cardholder data (CHD)

A

Any type of personally identifiable information (PII) associated with a person who has a payment card, such as a credit or debit card.

17
Q

(IP) Intellectual Property

A

Data that is of commercial value and can be granted rights of ownership, such as copyrights, patents, and trademarks.

18
Q

(PKI)

A

Public key infrastructure

19
Q

(PKI) Public key infrastructure

A

Framework of certificate authorities, digital certificates, software, services, and other cryptographic components deployed for the purpose of validating subject identities.

20
Q

(SSL)

A

Secure Socket Layer

21
Q

(SSL) Secure Socket Layer

A

The original, obsolete version of the security protocol now developed as TLS.

22
Q

What is the acronym for the three-digit security code typically located on the signature strip of a credit card?

A

CVV

23
Q

(SIEM)

A

Security Information and Event Management

24
Q

(SIEM) Security Information and Event Management

A

A solution that provides real-time or near-real-time analysis of security alerts generated by network hardware and applications.

25
Q

(SOAR)

A

Security Orchestration, Automation, and Response

26
Q

(SOAR) Security Orchestration, Automation, and Response

A

A class of security tools that facilitates incident response, threat hunting, and security configuration by orchestrating automated runbooks and delivering data enrichment.

27
Q

________ _______ combines and analyzes data from disparate sources to gain a greater understanding of it.

A

Data Enrichment

28
Q

Single Pane of Glass

A

A comprehensive, unified user interface that provides a comprehensive view of an IT environment and allows administrators to manage all connected components from one place. This type of interface simplifies the management of complex IT infrastructures.

29
Q

(API)

A

Application Programming Interface

30
Q

(API) Application Programming Interface

A

Methods exposed by a script or program that allow other scripts or programs to use it. For example, an API enables software developers to access functions of the TCP/IP network stack under a particular operating system.

31
Q

Webhooks

A

Automated messages sent from applications to other applications containing information about an event, such as the time it occurred, the data associated with it, and any other relevant information.

32
Q

Plugins

A

Additions that help tailor the software product to more closely match the infrastructure being managed from one organization to another.