CompTIA Security+ Vocabulary List Flashcards
(100 cards)
Active Directory
Directory service by Microsoft for Windows domain networks.
AES (Advanced Encryption Standard)
Symmetric encryption algorithm.
Application Layer
Layer 7 of the OSI model, providing network services to applications.
Anomaly Detection
Identifying unusual patterns that do not conform to expected behavior.
Attack Surface
Total points where an attacker can try to enter data into or extract data from an environment.
Audit Trail
Record of activities to ensure integrity and track changes.
Biometrics
Authentication using physical characteristics, like fingerprints or facial recognition.
Authentication Header (AH)
IPsec protocol providing connectionless integrity and data origin authentication.
Black Box Testing
Testing without knowledge of the internal workings of the application.
Blue Team
Group responsible for defending an organization from cyber attacks.
Bollard
Physical security device to prevent vehicle-based attacks.
CCTV (Closed-Circuit Television)
Video surveillance system.
Compensating Controls
Security controls that provide alternative measures.
Certificate Revocation List (CRL)
List of certificates that have been revoked by the Certificate Authority.
Chain of Custody
Documentation showing the seizure, custody, control, transfer, analysis, and disposition of evidence.
Ciphertext
Encrypted text transformed from plaintext.
Confidentiality
Ensuring that information is only accessible to those authorized to have access.
Control Diversity
Using different types of controls (administrative, technical, physical) to achieve security.
Data-at-Rest
Inactive data stored physically in any digital form.
Data-in-Transit
Data actively moving from one location to another.
Degaussing
Process of reducing or eliminating a magnetic field, often used to erase data from magnetic storage.
Digital Forensics
Process of uncovering and interpreting electronic data.
Elliptic Curve Cryptography (ECC)
Encryption algorithm based on elliptic curves over finite fields.
Demilitarized Zone (DMZ)
Physical or logical subnetwork that contains and exposes an organization’s external-facing services.