CompTIA Security+ Vocab List Flashcards
(175 cards)
Directory service by Microsoft for Windows domain networks.
Active Directory
Symmetric encryption algorithm.
AES (Advanced Encryption Standard)
Identifying unusual patterns that do not conform to expected behavior.
Anomaly Detection
Layer 7 of the OSI model, providing network services to applications.
Application Layer
Total points where an attacker can try to enter data into or extract data from an environment.
Attack Surface
Record of activities to ensure integrity and track changes.
Audit Trail
IPsec protocol providing connectionless integrity and data origin authentication.
Authentication Header (AH)
Authentication using physical characteristics, like fingerprints or facial recognition.
Biometrics
Testing without knowledge of the internal workings of the application.
Black Box Testing
Group responsible for defending an organization from cyber attacks.
Blue Team
Physical security device to prevent vehicle-based attacks.
Bollard
Video surveillance system.
CCTV (Closed-Circuit Television)
List of certificates that have been revoked by the Certificate Authority.
Certificate Revocation List (CRL)
Documentation showing the seizure, custody, control, transfer, analysis, and disposition of evidence.
Chain of Custody
Encrypted text transformed from plaintext.
Ciphertext
Security controls that provide alternative measures.
Compensating Controls
Ensuring that information is only accessible to those authorized to have access.
Confidentiality
Using different types of controls (administrative, technical, physical) to achieve security.
Control Diversity
Inactive data stored physically in any digital form.
Data-at-Rest
Data actively moving from one location to another.
Data-in-Transit
Process of reducing or eliminating a magnetic field, often used to erase data from magnetic storage.
Degaussing
Physical or logical subnetwork that contains and exposes an organization’s external-facing services.
Demilitarized Zone (DMZ)
Process of uncovering and interpreting electronic data.
Digital Forensics
Searching through waste to find confidential information.
Dumpster Diving