CompTIA CySA+ CS0-003 Deck 5 Flashcards

Learn key concepts found in the CompTIA CySA+ CS0-003 Exam. (32 cards)

1
Q

Shibboleth

A

An identity federation method that provides single sign-on capabilities and enables websites to make informed authorization decisions for access to protected online resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trust Model

A

In PKI, a description of how users and different CAs exchange information and certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(CASB)

A

Cloud Access Security Broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(CASB) Cloud Access Security Broker

A

Enterprise management software designed to mediate access to cloud services by users across all types of devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Forward proxy

A

A server that mediates the communications between a client and another server. It can filter and often modify communications as well as provide caching services to improve performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Reverse proxy

A

A type of proxy server that protects servers from direct contact with client requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(DLP)

A

Data loss prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(DLP) Data loss prevention

A

A software solution that detects and prevents sensitive information from being stored on unauthorized systems or transmitted over unauthorized networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(PII)

A

Personally Identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(PII) Personally Identifiable Information

A

Data that can be used to identify or contact an individual (or, in the case of identity theft, to impersonate them).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(PHI)

A

Protected Health Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(PHI) Protected Health Information

A

Data that can be used to identify an individual and includes information about past, present, or future health, as well as related payments and data used in the operation of a healthcare business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(PIFI)

A

Personal Identifiable Financial Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(PIFI) Personal Identifiable Financial Information

A

Personal information about a consumer provided to a financial institution that can include account number, credit/debit card number, name, social security number and other information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(CHD)

A

Cardholder data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cardholder data (CHD)

A

Any type of personally identifiable information (PII) associated with a person who has a payment card, such as a credit or debit card.

17
Q

(IP) Intellectual Property

A

Data that is of commercial value and can be granted rights of ownership, such as copyrights, patents, and trademarks.

18
Q

(PKI)

A

Public key infrastructure

19
Q

(PKI) Public key infrastructure

A

Framework of certificate authorities, digital certificates, software, services, and other cryptographic components deployed for the purpose of validating subject identities.

20
Q

(SSL)

A

Secure Socket Layer

21
Q

(SSL) Secure Socket Layer

A

The original, obsolete version of the security protocol now developed as TLS.

22
Q

What is the acronym for the three-digit security code typically located on the signature strip of a credit card?

23
Q

(SIEM)

A

Security Information and Event Management

24
Q

(SIEM) Security Information and Event Management

A

A solution that provides real-time or near-real-time analysis of security alerts generated by network hardware and applications.

25
(SOAR)
Security Orchestration, Automation, and Response
26
(SOAR) Security Orchestration, Automation, and Response
A class of security tools that facilitates incident response, threat hunting, and security configuration by orchestrating automated runbooks and delivering data enrichment.
27
________ _______ combines and analyzes data from disparate sources to gain a greater understanding of it.
Data Enrichment
28
Single Pane of Glass
A comprehensive, unified user interface that provides a comprehensive view of an IT environment and allows administrators to manage all connected components from one place. This type of interface simplifies the management of complex IT infrastructures.
29
(API)
Application Programming Interface
30
(API) Application Programming Interface
Methods exposed by a script or program that allow other scripts or programs to use it. For example, an API enables software developers to access functions of the TCP/IP network stack under a particular operating system.
31
Webhooks
Automated messages sent from applications to other applications containing information about an event, such as the time it occurred, the data associated with it, and any other relevant information.
32
Plugins
Additions that help tailor the software product to more closely match the infrastructure being managed from one organization to another.