Dion Training CompTIA Security+ Introduction Flashcards

(35 cards)

1
Q

CompTIA Security+ (SY0-701) certification exam consists of five domains or areas of
knowledge

A

■ 12% of General Security Concepts
■ 22% of Threats, Vulnerabilities, and Mitigations
■ 18% of Security Architecture
■ 28% of Security Operations
■ 20% of Security Program Management and Oversight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Information Security

A

Protecting data and information from unauthorized access, modification,
disruption, disclosure, and destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Information Systems Security

A

Protecting the systems (e.g., computers, servers, network devices) that hold and
process critical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the CIA Triad

A

■ Confidentiality
● Ensures information is accessible only to authorized personnel (e.g.,
encryption)
■ Integrity
● Ensures data remains accurate and unaltered (e.g., checksums)
■ Availability
● Ensures information and resources are accessible when needed (e.g.,
redundancy measures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Non-Repudiation

A

Guarantees that an action or event cannot be denied by the involved parties
(e.g., digital signatures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the CIANA Pentagon

A

An extension of the CIA triad with the addition of non-repudiation and
authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Triple A’s of Security

A

■ Authentication
● Verifying the identity of a user or system (e.g., password checks)
■ Authorization
● Determining actions or resources an authenticated user can access (e.g.,
permissions)
■ Accounting
● Tracking user activities and resource usage for audit or billing purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the Security Control Categories

A

■ Technical
■ Managerial
■ Operational
■ Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the Security Control Types

A

■ Preventative
■ Deterrent
■ Detective
■ Corrective
■ Compensating
■ Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Zero Trust Model

A

■ Operates on the principle that no one should be trusted by default
■ To achieve zero trust, we use the control plane and the data plane
● Control Plane
○ Adaptive identity, threat scope reduction, policy-driven access
control, and secured zones
● Data Plane
○ Subject/system, policy engine, policy administrator, and
establishing policy enforcement points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Threat

A

■ Anything that could cause harm, loss, damage, or compromise to our information
technology systems
■ Can come from the following
● Natural disasters
● Cyber-attacks
● Data integrity breaches
● Disclosure of confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Vulnerability

A

■ Any weakness in the system design or implementation
■ Come from internal factors like the following
● Software bugs
● Misconfigured software
● Improperly protected network devices
● Missing security patches
● Lack of physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Where threats and vulnerabilities intersect, that is where the risk to your enterprise
systems and networks lies

A

■ If you have a threat, but there is no matching vulnerability to it, then you have no
risk
■ The same holds true that if you have a vulnerability but there’s no threat against
it, there would be no risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Risk Management

A

■ Finding different ways to minimize the likelihood of an outcome and achieve the
desired outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Confidentiality

A

■ Refers to the protection of information from unauthorized access and disclosure
■ Ensure that private or sensitive information is not available or disclosed to
unauthorized individuals, entities, or processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Confidentiality is important for 3 main reasons
What are they

A

■ To protect personal privacy
■ To maintain a business advantage
■ To achieve regulatory compliance

17
Q

To ensure confidentiality, we use five basic methods
What are they

A

■ Encryption
● Process of converting data into a code to prevent unauthorized access
■ Access Controls
● By setting up strong user permissions, you ensure that only authorized
personnel can access certain types data
■ Data Masking
● Method that involves obscuring specific data within a database to make it
inaccessible for unauthorized users while retaining the real data’s
authenticity and use for authorized users
■ Physical Security Measures
● Ensure confidentiality for both physical types of data, such as paper
records stored in a filing cabinet, and for digital information contained on
servers and workstations
■ Training and Awareness
● Conduct regular training on the security awareness best practices that
employees can use to protect their organization’s sensitive data

18
Q

What is Integrity

A

■ Helps ensure that information and data remain accurate and unchanged from its
original state unless intentionally modified by an authorized individual
■ Verifies the accuracy and trustworthiness of data over the entire lifecycle

19
Q

Integrity is important for three main reasons what are they

A

■ To ensure data accuracy
■ To maintain trust
■ To ensure system operability

20
Q

To help us maintain the integrity of our data, systems, and networks, we usually utilize
five methods, what are they?

A

■ Hashing
● Process of converting data into a fixed-size value
■ Digital Signatures
● Ensure both integrity and authenticity
■ Checksums
● Method to verify the integrity of data during transmission
■ Access Controls
● Ensure that only authorized individuals can modify data and this reduces
the risk of unintentional or malicious alterations
■ Regular Audits
● Involve systematically reviewing logs and operations to ensure that only
authorized changes have been made, and any discrepancies are
immediately addressed

21
Q

What is Availability

A

Ensure that information, systems, and resources are accessible and operational
when needed by authorized users

22
Q

As cybersecurity professionals, we value availability since it can help us with what

A

■ Ensuring Business Continuity
■ Maintaining Customer Trust
■ Upholding an Organization’s Reputation

23
Q

What is Redundancy

A

Duplication of critical components or functions of a system with the intention of enhancing its reliability

24
Q

There are various types of redundancy you need to consider when designing your systems and networks what are they

A

■ Server Redundancy
● Involves using multiple servers in a load balanced or failover configuration
so that if one is overloaded or fails, the other servers can take over the
load to continue supporting your end users
■ Data Redundancy
● Involves storing data in multiple places
■ Network Redundancy
● Ensures that if one network path fails, the data can travel through
another route
■ Power Redundancy
● Involves using backup power sources, like generators and UPS systems

25
What is Non-repudiation
■ Focused on providing undeniable proof in the world of digital transactions ■ Security measure that ensures individuals or entities involved in a communication or transaction cannot deny their participation or the authenticity of their actions
26
What is a Digital Signatures
■ Considered to be unique to each user who is operating within the digital domain ■ Created by first hashing a particular message or communication that you want to digitally sign, and then it encrypts that hash digest with the user’s private key using asymmetric encryption
27
Non-repudiation is important for three main reasons what are they
■ To confirm the authenticity of digital transactions ■ To ensure the integrity of critical communications ■ To provide accountability in digital processes
28
What is Authentication
■ Security measure that ensures individuals or entities are who they claim to be during a communication or transaction
29
5 commonly used authentication methods are what
■ Something you know (Knowledge Factor) ● Relies on information that a user can recall ■ Something you have (Possession Factor) ● Relies on the user presenting a physical item to authenticate themselves ■ Something you are (Inherence Factor) ● Relies on the user providing a unique physical or behavioral characteristic of the person to validate that they are who they claim to be ■ Something you do (Action Factor) ● Relies on the user conducting a unique action to prove who they are ■ Somewhere you are (Location Factor) ● Relies on the user being in a certain geographic location before access is granted
30
Multi-Factor Authentication System (MFA) is what
■ Security process that requires users to provide multiple methods of identification to verify their identity
31
Authentication is critical to understand because of what
■ To prevent unauthorized access ■ To protect user data and privacy ■ To ensure that resources are accessed by valid users only
32
What is Authorization
■ Pertains to the permissions and privileges granted to users or entities after they have been authenticated
33
Authorization mechanisms are important to help us with what
■ To protect sensitive data ■ To maintain the system integrity in our organizations ■ To create a more streamlined user experience
34
Accounting is what
■ Security measure that ensures all user activities during a communication or transaction are properly tracked and recorded
35