Appendixes from CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide

Six appendixes taken from the author's website

337 115 5MB

English Pages [114]

Report DMCA / Copyright

DOWNLOAD PDF FILE

Recommend Papers

Appendixes from CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Citation preview

Appendix A—Command Line Basics When taking the CompTIA Security+ exam, CompTIA expects you to know commandline basics. Many people working in IT jobs know the command line because they work with

this appendix is for you.

Ah

Windows Command Line

ea d

it regularly. However, it can be challenging for others. If you’re new to the command line,

Before you can use the command line in Windows, you first need to launch the

Windows Command Prompt window. The simplest way to do so is to click the Start button,

G et

type in Command, and select Command Prompt. The Start button is at the lower left of your screen.

In some situations, you need to start the Command Prompt window with elevated permissions as an administrator. To do this, click the Start button, type in Command, right-

d

click on Command Prompt, and select Run as administrator.

ie

If you’re using a different version of Windows, you can find directions online. Use your

tif

favorite search engine and enter “command prompt” to find it.

er

Linux Terminal

C

The terminal is where you run commands in a Linux system. There are different ways to access the terminal, depending on the distribution you’re using. If you’re

et

running Kali Linux (recommended while using this book), you can start it by simply clicking the terminal icon on the Kali menu.

G

Many test takers find learning Linux commands challenging because they don’t

have a Linux system. If you can’t enter them and see what they do, you might have trouble with even the easiest questions. However, it’s easy to create a bootable USB (or buy one) and use any PC as a Linux box. The online labs include a lab you can use to create a bootable USB. Figure Appx A.1 shows an instance of Kali with the menu on the left. If you hover over the second icon, you’ll see “Terminal” appear. Click it, and it starts the terminal.

ea d Ah

Figure Appx A.1: Launching the terminal in Kali Linux

G et

For simplicity, instead of stating “Linux or Unix” throughout this book, I’m just stating it as Linux. Note that Linux is a popular version of Unix, and most commands that run in a Unix terminal will also run in a Linux terminal.

ie

d

Understanding Switches and Getting Help Almost every command you’ll run across has options available that you can invoke

tif

with a switch. A Windows command-line switch uses a forward slash (/) or a dash (-)

er

after the command and includes an option that modifies the command to perform a different function.

C

Linux commands use switches too, but they typically only use a dash. If you use a forward slash, you will typically get unexpected results or an error.

et

The most used switch in Windows systems is the help switch identified with a question mark. For example, you can use the help switch to get help using these

G

commands: •

ping /? or ping -?



ipconfig /? or ipconfig -?



netstat /? or netstat -?

Although Linux terminal commands also use switches, they don’t use the question mark for help. The common way to get help on a command is to query the online system Copyright 2021 YCDA, LLC.

reference manual using the man command. For example, the following commands retrieve help on the relevant commands: • man ping • man ifconfig • man netstat Some commands have extensive feedback available when you use incorrect syntax.

ea d

As an example, ping doesn’t recognize the -? switch on Linux systems. Instead of just

giving you a message of “incorrect syntax,” it provides details on usage. This looks like

Ah

help, but it is different than the information in the man page.

Understanding Case

G et

Most Windows commands are not case sensitive. In other words, you can type in

commands using uppercase characters, lowercase characters, or any combination. For example, each of the following commands ping the localhost IPv6 address (::1) and provide

ping -6 localhost



PiNg -6 localHOST



PING -6 LocalHost

ie



d

the same output:

tif

However, this is not true in the Linux terminal. Instead, commands are typically

er

lowercase, and if you use uppercase letters, you’ll find that the command is not recognized. Of the three commands shown for the Windows command line, only ping -6

C

localhost works within the Linux terminal. As you go through these commands, note that many of them support both IPv4

et

addresses and IPv6 addresses. By querying help, you can see how to do each.

G

Understanding Linux Permissions Linux permissions may look odd the first time you see them, but they represent three

simple concepts—read, write, and execute: • Read (R) indicates someone can open the file and view its contents.

Copyright 2021 YCDA, LLC.

• Write (W) indicates a user can modify the contents. You’ll see read combined with write most, if not all of the time. • Executes (X) indicates a user can launch the file. It is assigned to files that can be executed. Additionally, permissions apply to three identities: • The first set of permissions applies to the owner of the file.

ea d

• The second set of permissions applies to the owner’s primary group (by default). Any user can be a member of multiple groups, but a user will have only one • The third set of permissions applies to everyone else.

Ah

primary group. The default owner group can be changed if desired.

You can see a list of files in a folder along with their permissions by using the ls -l command at the terminal. The following shows an abbreviated output from the ls -l

G et

command:

-rwx rw- r-- user usergroup size/date/time myfile.txt

drwx r-- --- user usergroup size/date/time mydirectory

The first line shows the permissions assigned to a file named myfile.txt, and the second

d

line shows the permissions assigned to a directory named mydirectory. Note that the first

ie

character is a dash (-) or a d and indicates the entry refers to a file using a dash (-) or a

tif

directory, using a d. The three group permissions for the file are: • rwx indicating read, write, and execute permissions for the owner

er

• rw- indicating read and write permissions for the owner group • r-- indicating read permission only for everyone else

C

Note that when a permission isn’t assigned, you’ll see a dash instead.

et

Converting Linux Permissions to Numbers

G

You’ll often see permissions represented as octal numbers (from 0 to 7). As an example,

consider the myfile.txt mentioned earlier. Instead of representing the permissions as rwx rwr- -, it would be 7 6 4. It’s worthwhile to refresh your knowledge of octal numbers, which is a base-8 numbering system. Three binary bits represent each octal number, as shown in the following list: Copyright 2021 YCDA, LLC.

• Octal 0 = Binary 0 0 0 • Octal 1 = Binary 0 0 1 • Octal 2 = Binary 0 1 0 • Octal 3 = Binary 0 1 1 • Octal 4 = Binary 1 0 0

ea d

• Octal 5 = Binary 1 0 1 • Octal 6 = Binary 1 1 0 • Octal 7 = Binary 1 1 1

Additionally, each group of binary bits represents specific permissions:

Ah

• The first bit is used for read (r). • The second bit is used for write (w). • The third bit is used for execute (x).

G et

If the bit is a 1, it indicates that a permission is granted. If the bit is a 0, it indicates that a permission is not granted. The following list shows the commonly used octal numbers and their related permissions:

d

• Octal 0 = Binary 0 0 0 No permissions (- - - ) • Octal 4 = Binary 1 0 0 Read (r - -)

ie

• Octal 5 = Binary 1 0 1 Read and Execute (r - x)

tif

• Octal 6 = Binary 1 1 0 Read and Write (r w -)

er

• Octal 7 = Binary 1 1 1 Read, Write, and Execute (r w x) The following list shows octal numbers that are not normally used:

C

• Octal 1 = 0 0 1 Binary Execute (not used because Execute also needs read) • Octal 2 = 0 1 0 Binary Write (rarely used because Write would typically include

et

Read) • Octal 3 = Binary 0 1 1 Write and Execute (not used because Execute also needs

G

read)

This is an appendix for the CompTIA Security+ Get Certified Get Ahead: SY0-

601 Study Guide. It is provided as an extra resource for test takers in PDF format. However, distribution of PDF copies of the CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide are not authorized. Copyright 2021 YCDA, LLC.

Appendix B—Log Basics When taking the CompTIA Security+ exam, you’ll be expected to read and understand log entries. It’s often trivial for administrators who look at logs every day to identify relevant

challenging.

Ah

Understanding Log Basics

ea d

elements in a log entry. However, for people who don’t look at logs regularly, this can be

CompTIA frequently refers to logs throughout the exam objectives. They are

valuable tools when troubleshooting. Unfortunately, there isn’t a single way that logs are

G et

formatted making them sometimes hard to read, especially when randomly placed within a question. However, there are many common elements that you can usually identify in log entries.

Logs typically record what happened, when it happened, where it happened, and

d

who did it. This allows someone, such as an administrator or security professional, to

ie

analyze the logs to gain details of events.

Many times, security administrators are searching the logs looking for event

tif

anomalies. As a simple example, attackers sometimes try to log on to accounts by

er

guessing passwords. Security logs record these attempts as failed logons, which is an event anomaly. After investigating the failed logins, administrators can determine if the

C

failed logins were part of normal operation or a security incident. It’s tempting to set up logging to record every event and provide as much detail as

et

possible—most logs support a verbose mode that will log additional details. However, a limiting factor is the amount of disk space available. Additionally, when logging is

G

enabled, there is an implied responsibility to review the logs. The more you choose to log, the more you may have to review. The goal is to balance what is needed and the amount of available space for storage. The following sections cover some issues to consider when reviewing logs.

Reading Logs It isn’t feasible to describe every possible log from every known vendor, at least if I want to keep the page count of this book less than 2,000 pages. However, there are

When It Happened

ea d

common log attributes that you can look for to help you read them.

Every log entry has a timestamp to let you know when the event happened.

For example, you may see something like the following: 22:02:2021 20:10:05 10.10.80.5:49154 > 192.168.1.15:21 22:02:2021 20:24:17 10.10.80.5:49154 > 192.168.1.15:20

Ah

Timestamps include both the date and time, but not always in an easily readable form.

G et

22:02:2021 20.37.37 10.80.5:49:154 > 192.168.1.15:25

22:02:2021 20.46.41 10.10.80.5:49154 > 192.168.1.15:23

With a little deductive reasoning, you can see that each entry includes 22:02:2021 (February 2nd, 2021), and that is the date. The next set of data is the time (using a 24-

d

hour clock). It indicates the traffic occurred at 8:10 and 5 seconds (PM), 8:24 and 17

ie

seconds (PM), 8:37 and 37 seconds (PM), and 8:46 and 41 seconds (PM), respectively. In many logs, they spell out the month because an entry such as 05:12:2021 is

tif

ambiguous. Is it May 12th or December 5th? It just isn’t clear.

er

Using a 24-hour clock saves space in a log but is confusing to some people. Hours less than 12 are in the morning (AM) and hours after 12 are in the afternoon and

C

evening. An easy way to identify the time for any hours after 12 is by subtracting 12 from the hour. For example, with a time of 13:10:05, you’d subtract 12 from 13

et

(indicating 1 PM).

G

Where It Happened Many log entries include a source and a destination. This is simply where the traffic

originated and where it is going. There are several ways that a log entry may indicate the source and destination, such as: • A computer name (such as Server 1) • An IPv4 address (such as 192.168.80.14) • A socket, which includes an IPv4 address and a port (such as 192.168.80.14:443) • An IPv6 address

• A media access control (MAC) address such as 01:23:45:67:89:ab Sometimes, the log entry may list the computer name (such as Server1), but more often, it uses the IPv4 address or the socket. A socket is an established connection and includes an IP address and a port number. You’ll see the IP address and port separated by a colon, such as 192.168.80.14:443. When a socket is used, the IP address indicates the source or destination computer, and

ea d

the port tells the computer what service to send the traffic to when it arrives. A destination

port of 443 indicates the Hypertext Transfer Protocol Secure (HTTPS) service should receive and handle the traffic.

Ah

In some cases, you’ll find that one socket has a public IP address and another socket has a private IP address. If the log entry is recording traffic in an attack, the public IP address indicates the system sending the attack. The private IP address is the internal computer being

G et

attacked. Note that the public IP address may be a spoofed address or a compromised system controlled by an attack.

Some logs use MAC addresses to identify computers. If you can recognize MAC addresses, this should be easy to identify. MAC addresses are typically represented as six

ie

d

pairs of hexadecimal characters (such as 12:ab:34:cd:56:ef).

tif

What Happened

Some log entries require you to analyze them and identify what is the same and what is

er

different. The following entries provide insight into what happened, but you need to understand sockets:

C

22:11:20 20:10:05 10.10.80.5:49154 > 192.168.1.15:21 22:11:20 20:24:17 10.10.80.5:49154 > 192.168.1.15:20

et

22:11:20 20.37.37 10.80.5:49154 > 192.168.1.15:25 22:11:20 20.46.41 10.10.80.5:49154 > 192.168.1.15:23

G

It’s not always apparent, but in these entries, the “>” character indicates the direction of

the traffic. Traffic is going from 10.10.80.5 to 192.168.1.15. Notice that the source sockets are identical. They have the same IP address and the same port. In contrast, the ports in the destination socket are all different. This indicates that the attacker (10.10.80.5:49154) is

Copyright 2021 YCDA, LLC.

performing a port scan on the destination computer (192.168.1.15). If the port is open, the system responds. If the port is closed, it doesn’t respond.

Who Did It Some log entries include human-readable text. Take a look at the following partial log entries and see if you can identify what happened:

ea d

2/24/2021/02:01:05 Homer 192.168.1.10 action:login/success 2/24/2021/02:02:30 Homer 192.168.1.10 action:login/fail 2/24/2021/02:03:31 Homer 192.168.1.10 action:login/fail

Ah

2/24/2021/02:04:32 Homer 192.168.1.10 action:login/fail

The first entry indicates Homer logged in successfully. Afterward, it shows three login failures. This could suggest many things. However, notice that all four entries are within a

G et

minute of each other. Homer could have logged off accidentally and then forgot the credentials he just used a moment ago. It could also indicate a malicious actor who previously captured Homer’s credentials, logged on, changed Homer’s password, and then

d

verified that the old credentials aren’t working.

ie

Applying Critical Thinking Skills

tif

You’ll often find that a CompTIA Security+ question will lack details, such as entire log entries. Other times, you may see questions with an excessive amount of details that

C

critical thinking.

er

have nothing to do with the question. In these circumstances, you’ll need to apply some

In short, critical thinking is the process of analyzing the facts you have to make a

et

judgment. Admittedly, critical thinking is a complex topic. While the single sentence description explains what you need for the CompTIA Security+ exam, there are several

G

definitions. Here are a few: • “Disciplined thinking that is clear, rational, open-minded, and informed by evidence.” (dictionary.com)

• “Critical thinking is the ability to think in an organized and rational manner in order to understand connections between ideas and/or facts.” (zety.com) • “Critical thinking is the intellectually disciplined process of actively and skillfully conceptualizing, applying, analyzing, synthesizing, and/or evaluating information gathered from, or generated by, observation, experience, reflection,

reasoning, or communication, as a guide to belief and action.” (criticalthinking.org) Some of you may be wondering, “What does this have to do with logs and the CompTIA Security+ exam?” When you see a question with sample log output, you’ll often be required to apply

additional concepts. Consider these questions: • Does the log entry show IP addresses? •

ea d

your knowledge to understand the question, even if the question doesn’t directly mention

If so, are some private and some public? See RFC 1918 if you don’t know

Ah

how to tell the difference. •

Are any IP addresses the same?



Do you see any sockets? Are any of the sockets the same? Are any of the

G et

sockets different? This can help you determine the direction of the traffic. • Does the entry show any MAC addresses? Can you identify a MAC address if you see one?

• Are there any timestamps? Do you recognize them?

d

• Are there English words, such as account name or action results? You’ll rarely

ie

see full sentences in a log entry, but instead, you need to determine what the log

tif

entry is communicating with just a few words. This appendix addresses each of these questions, but it doesn’t cover every

er

possibility. Instead, my intention is to give you some basics you can apply when you see

C

questions that include log entries.

This is an appendix for the CompTIA Security+ Get Certified Get Ahead: SY0-

et

601 Study Guide. It is provided as an extra resource for test takers in PDF format.

G

However, distribution of PDF copies of the CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide are not authorized.

Copyright 2021 YCDA, LLC.

Appendix C—Well-Known Ports CompTIA has deemphasized ports in recent exams. However, they may still include them in tests. Additionally, some test-takers don’t fully understand how ports are used. This appendix may

d

fill in some holes for you and will give you a reminder of the ports in case you need it.

ea

Port Basics

Ports are logical numbers used by TCP/IP to identify what service or application should handle data received by a system. Both TCP and UDP use ports with a total of 65,536 TCP ports (0 to 65,535) and

Ah

65,536 UDP ports (0 to 65,535). Administrators open ports on firewalls and routers to allow the

associated protocol into or out of a network. For example, Hypertext Transfer Protocol (HTTP) uses port 80, and an administrator allows HTTP traffic by opening port 80.

et

Additionally, administrators disable unnecessary ports and services as part of a basic security practice. These ports and services are associated with specific protocols and if they are disabled, it blocks

G

any attacks on these ports, services, and protocols.

The Internet Assigned Numbers Authority (IANA) maintains a list of official port assignments that you can view at https://www.iana.org/assignments/service-names-port-numbers/service-names-port-

ed

numbers.xhtml.

IANA divided the ports into three ranges, as follows:

Well-known ports: 0–1023. IANA assigns port numbers to commonly used protocols in the



tif i

well-known ports range.

Registered ports: 1024–49,151. IANA registers these ports for companies as a convenience to



er

the IT community. A single company may register a port for proprietary use, or multiple companies may use the same port for a specific standard. As an example, Microsoft SQL Server

C

uses port 1433 for database servers, Layer 2 Tunneling Protocol (L2TP) uses port 1701, and Point-to-Point Tunneling Protocol (PPTP) uses port 1723. Dynamic and private ports: 49,152–65,535. These ports are available for use by any



et

application. Applications commonly use these ports to map an application to a port temporarily.

G

These temporary port mappings are often called ephemeral ports, indicating that they are shortlived.

Although virtually all the ports are subject to attack, most port attacks are against the well-known

ports. Port scanners often simply check to see if a well-known port is open. For example, SMTP uses the

well-known port 25, so if port 25 is open, the system is likely running SMTP.

Network administrators who regularly work with routers and firewalls can easily tell you which protocol is associated with which well-known port, such as 20, 21, 22, 23, 25, 80, 443, and so on. The reason is that they use these ports to allow or block traffic. For example, an administrator can close port 25 to block all SMTP traffic into a network. The router

d

then ignores traffic on port 25 instead of forwarding it. Similarly, an administrator can close port 1433 to block database traffic to a Microsoft SQL server. On the other hand, the administrator can open port 25 or

ea

port 1433 to allow SMTP traffic or traffic to a Microsoft SQL server, respectfully.

Although ports are second nature to router and firewall administrators, they might not be so familiar you’re ready for the exam.

Combining the IP Address and the Port

Ah

to you. If you don’t work with the ports often, you’ll need to spend some extra time studying to ensure

et

At any moment, a computer could be receiving dozens of packets, and each of these packets includes a destination IP address and a destination port. TCP/IP uses the IP address to get the packet to the

G

computer. The computer then uses the port number to get the packet to the correct service, protocol, or application that can process it.

For example, if the packet has a destination port of 443, the well-known port for Hypertext Transfer

ed

Protocol Secure (HTTPS), the system passes the packet to the process handling HTTPS. It wouldn’t do much good to pass an SMTP email packet to the HTTPS service or send an HTTPS request packet to the

tif i

SMTP service.

IP Address Used to Locate Hosts

er

Imagine that the IP address of GetCertifiedGetAhead.com is 35.221.53.172, and the address assigned to your computer in an internal network is 192.168.10.11. TCP/IP uses these IP addresses to get the

C

packets from your computer to the web server and the web server’s answer back to your computer. There’s a lot more that occurs under the hood with TCP/IP (such as DNS, NAT, and ARP), but the

main point is that the server’s IP address is used to get the requesting packet from your computer to the

et

server. The server gets the response packets back to your computer using your IP address (or the IP

G

address of your NAT server).

Server Ports Different protocols are enabled and running on a server. These protocols have well-known or registered port numbers, such as port 22 for SSH, 25 for SMTP, 80 for HTTP, 443 for HTTPS, and so on.

Copyright 2021 YCDA, LLC.

When the system receives traffic with a destination of port 443, the system knows to send it to the service handling HTTPS. Any web browser knows that the well-known port for HTTPS is 443. Even though you don’t see port 443 in the URL, it is implied as HTTPS://GetCertifiedGetAhead.com:443. If you omit the port number,

d

HTTPS uses the well-known port number 443 by default. Popular web servers on the Internet include Apache and Internet Information Services (IIS). Apache

ea

is free and runs on Unix or Linux systems. Apache can also run on other platforms, such as Microsoft

systems. IIS is included in Microsoft Server products. These web servers use port 443 for HTTPS. When

Ah

the server receives a packet with a destination port of 443, the server sends the packet to the web server application (Apache or IIS) that processes it and sends back a response.

Client Ports

et

TCP/IP works with the client operating system to maintain a table of client-side ports using available ports in the dynamic and private ports range. This table associates port numbers with different

G

applications that are expecting return traffic. Client-side ports start at port 49,152 and increment up to 65,535. If the system uses all the ports between 49,152 and 65,535 before being rebooted, it’ll start over at 49,152.

ed

When you use your web browser to request a page from a site, your system will record an unused client port number such as 49,152 in an internal table to handle the return traffic. When the web server

tif i

returns the webpage, it includes the client port as a destination port. When the client receives webpage packets with a destination port of 49,152, it sends these packets to the web browser application. The

er

browser processes the packets and displays the page.

Putting It All Together

C

The previous section described the different pieces, but it’s useful to put this together into a single

description. Imagine that you decide to visit the website https://GetCertifiedGetAhead.com using your web browser, so you type the URL into the browser, and the webpage appears. Here are the details of

et

what is happening. Figure C.1 provides an overview of how this will look, and the following text explains

G

the process.

Copyright 2021 YCDA, LLC.

d ea Ah et G ed

tif i

Figure C.1: Using source and destination ports

Your computer creates a packet with source and destination IP addresses and source and destination ports. It queries a DNS server for the IP address of GetCertifiedGetAhead.com and learns that the IP

er

address is 35.221.53.172. Additionally, your computer will use its IP address as the source IP address. For this example, imagine your computer’s IP address is 192.168.10.11.

C

Because the web server is serving webpages using HTTPS and the well-known port is used, the

destination port is 443. Your computer will identify an unused port in the dynamic and private ports range (a port number between 49,152 and 65,535) and map that port to the web browser. For this example,

et

imagine it assigns 49,152 to the web browser. It uses this as the source port. At this point, the outgoing packet has both destination and source data as follows: Destination IP address: 35.221.53.172 (the web server)



Destination port: 443



Source IP address: 192.168.10.11 (your computer)



Source port: 49,152

G



Copyright 2021 YCDA, LLC.

TCP/IP uses the IP address (35.221.53.172) to get the packet to the GetCertifiedGetAhead web server. When it reaches the web server, the server looks at the destination port (443) and determines that the packet needs to go to the web server program servicing HTTPS. The web server creates the page and puts the data into one or more return packets. At this point, the source and destinations are swapped



Destination port: 49,152



Source IP address: 35.221.53.172 (the web server)



Source port: 443

ea

Destination IP address: 192.168.10.11 (your computer)

Ah



d

because the packet is coming from the server back to you:

Again, TCP/IP uses the IP address to get the packets to the destination. Once the packets reach your system, it sends them to the destination port (port 49,152). Because your system mapped this port to your web browser, it sends the packets to the web browser, displaying the webpage.

et

The Importance of Ports in Security

G

Routers, and the routing component of firewalls, filter packets based on IP addresses, ports, and some protocols such as ICMP or IPsec. Because many protocols use well-known ports, you can control

ed

protocol traffic by allowing or blocking traffic based on the port. In the previous example, the client firewall must allow outgoing traffic on port 443. Firewalls automatically determine the client ports used for return traffic, and if they allow the outgoing traffic, they

tif i

allow the return traffic. In other words, because the firewall allows the packet to go to the web server on the destination port of 443, it also allows the webpage to return on the dynamic source port of 49,152.

er

Note that the client firewall doesn’t need to allow incoming traffic on port 443 for this to work. The web client isn’t hosting a web server with HTTPS, so the client firewall would block incoming traffic on port 443. However, the firewall that is allowing traffic to the web server needs to allow incoming traffic

C

on port 443.

You can apply this same principle to any protocol and port. For example, if you want to allow SMTP

et

traffic, you create a rule on the firewall to allow traffic on port 25 or port 587 for SMTP encrypted with TLS. IT professionals modifying access control lists (ACLs) on routers and firewalls commonly refer to

G

this as opening a port to allow traffic or closing a port to block traffic.

Comparing Ports and Protocol Numbers Ports and protocol numbers are not the same things, though they are often confused. Well-known ports identify many services or protocols, as discussed previously. Copyright 2021 YCDA, LLC.

However, many protocols are not identified by the port but instead by the protocol numbers. For example, within Internet Protocol security (IPsec), protocol number 50 indicates the packet is an Encapsulating Security Payload (ESP) packet, and protocol number 51 indicates it’s an Authentication Header (AH) packet. Similarly, ICMP uses the protocol number of 1, TCP is 6, and UDP is 17.

d

You can use a protocol number to block or allow traffic on routers and firewalls just as you can block or allow traffic based on the port. Note that it is not accurate to say that you can allow IPsec ESP

ea

traffic by opening port 50. IANA lists port 50 as a Remote Mail Checking Protocol. However, you can allow IPsec traffic by allowing traffic using protocol number 50.

Ah

Port Tables

The following tables show many of the well-known ports that you may need to know when taking

er

tif i

ed

G

et

the CompTIA Security+ exam.

G

et

C

Table C.1: Ports and protocols

Copyright 2021 YCDA, LLC.

d ea Ah

et

C

er

tif i

ed

G

et

Table C.2: Ports and protocols

G

This is an appendix for the CompTIA Security+ Get Certified Get Ahead: SY0-601 Study

Guide. It is provided as an extra resource for test-takers in PDF format. However, PDF copies of

the CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide are not authorized.

Copyright 2021 YCDA, LLC.

Appendix D—The OSI Model The CompTIA Security+ objectives refer to the Open Systems Interconnection (OSI) model in a couple of places: Given a scenario, analyze potential indicators associated with network attacks. • Layer 2 attacks - Address Resolution Protocol (ARP) poisoning - Media access control (MAC) flooding - MAC cloning

3.6

Given a scenario, apply cybersecurity solutions to the cloud. • Solutions - Firewall considerations in a cloud environment - Open Systems Interconnection (OSI) layers

Ah

ea

d

1.4

et

The OSI reference model conceptually divides different networking requirements into seven separate layers. For most people studying for the CompTIA Security+ exam, the OSI

G

model isn’t new. However, because it’s primarily theoretical and rarely used in day-to-day maintenance, some of the knowledge often slips away.

d

The good news is that you don’t need to know it as in-depth as you would for other

ie

certification exams such as the CompTIA Network+ exam. If you recently studied for

tif

Network+, you probably mastered these concepts, and this will just be a quick review.

er

Understanding the Layers

C

The OSI model has seven layers. The layers from Layer 1 to Layer 7 are Physical, Data Link, Network, Transport, Session, Presentation, and Application. Many people use mnemonics to memorize the layers. For example, “Please Do Not Throw Sausage Pizza

et

Away.” The first letter in each of the words represents the first letter of the layer. The P in

G

Please is for Physical, the D in Do is for the Data Link layer, and so on. Another common mnemonic is “All People Seem To Need Data Processing” (for

Application, Presentation, Session, Transport, Network, Data Link, and Physical). Notice that this method lists the layers from Layer 7 to Layer 1.

G et

Table D.1: OSI layers and common mnemonics

Ah

ea d

Table D.1 summarizes the layers with the mnemonics.

After mastering the mnemonic, you also need to remember which layer is Layer 1, and which layer is Layer 7. This memory technique may help. You may have heard about a “Layer 8 error.” This is another way of saying “user error” and users interact with

d

applications. In other words, a user on the mythical Layer 8 interacts with applications, which

ie

are on Layer 7. I don’t mean to belittle users or user errors—I make my fair share of errors. However, this memory trick has helped me, and many other people, remember that the

tif

Application layer is Layer 7.

er

The following sections provide a short synopsis of these layers.

C

Layer 1: Physical

The Physical layer is associated with the physical hardware. It includes specifications

et

for cable types, such as 1000BaseT, connectors, and hubs. Computing devices such as computers, servers, routers, and switches transmit data onto the transmission medium in a

G

bitstream. This bitstream is formatted according to specifications at higher-level OSI layers.

Layer 2: Data Link The Data Link layer is responsible for ensuring that data is transmitted to specific devices on the network. It formats the data into frames and adds a header that includes media

Copyright 2021 YCDA, LLC.

access control (MAC) addresses for the source and destination devices. It adds frame check sequence data to the frame to detect errors, but it doesn’t support error correction. The Data Link layer simply discards frames with detected errors. Flow control functions are also available on this layer. Traditional switches (Layer 2 switches) operate on this layer. Computer network interface cards have a MAC assigned, and switches map the computer MAC addresses to

IPv4 addresses to MAC addresses. VLANs are defined on this layer.

ea d

physical ports on the switch. Systems use the Address Resolution Protocol (ARP) to resolve

The CompTIA Security+ objectives list Layer 2 attacks as Address Resolution Protocol “Protecting Against Advanced Attacks,” covers these attacks.

G et

Layer 3: Network

Ah

(ARP) poisoning, media access control (MAC) flooding, and MAC cloning. Chapter 7,

The Network layer uses logical addressing in the form of IP addresses at this layer. This includes both IPv4 addresses and IPv6 addresses. Packets identify where the traffic originated (the source IP address) and where it is going (the destination IP address). Other

d

protocols that operate on this layer are IPsec and ICMP. Routers and Layer 3 switches

tif

Layer 4: Transport

ie

operate on this layer.

er

The Transport layer is responsible for transporting data between systems, commonly referred to as end-to-end connections. Transmission Control Protocol (TCP) and User

C

Datagram Protocol (UDP) operate on this layer. TCP provides reliability with error control,

et

flow control, and segmentation of data.

G

Layer 5: Session

The Session layer is responsible for establishing, maintaining, and terminating sessions

between systems. In this context, a session refers to an extended connection between two systems, sometimes referred to as dialogues or conversations. As an example, if you log on to a webpage, the Session layer establishes a connection with the web server and keeps it open

Copyright 2021 YCDA, LLC.

while you’re interacting with the webpages. When you close the pages, the Session layer terminates the session. If you’re like many users, you probably have more than one application open at a time. For example, in addition to having a web browser open, you might have an email application open. Each of these is a different session, and the Session layer manages them separately.

ea d

Layer 6: Presentation

The Presentation layer is responsible for formatting the data needed by the end-user

applications. For example, American Standard Code for Information Interchange (ASCII)

define codes used to display characters on this layer.

G et

Layer 7: Application

Ah

and Extended Binary Coded Decimal Interchange Code (EBCDIC) are two standards that

The Application layer is responsible for displaying information to the end user in a readable format. Application layer protocols typically use this layer to determine if sufficient network resources are available for an application to operate on the network.

d

Note that this layer doesn’t refer to end-user applications directly. However, many end-

ie

user applications use protocols defined at this layer. For example, a web browser interacts

tif

with DNS services to identify the IP address of a website name. Similarly, Hypertext

on this layer.

er

Transfer Protocol (HTTP) and HTTP Secure (HTTPS) transmit webpages over the Internet

Some of the protocols that operate on this layer are:

C

• HTTP and HTTPS

• Secure Shell (SSH)

et

• Domain Name System (DNS)

G

• Post Office Protocol 3 (POP3) • Simple Mail Transfer Protocol (SMTP) • File Transfer Protocol (FTP) and FTP Secure (FTPS) • Secure FTP (SFTP) and Trivial FTP (TFTP) • Internet Message Access Protocol 4 (IMAP4)

Copyright 2021 YCDA, LLC.

• Simple Network Management Protocol (SNMP) • Lightweight Directory Access Protocol (LDAP) and LDAP Secure (LDAPS) Many advanced devices are application-aware and operate on all of the layers up to the Application layer. This includes proxy servers, web application firewalls, next-generation firewalls (NGFWs), unified threat management (UTM) security appliances, and web security

d

G et

Ah

Table D.2 summarizes the layers with relevant devices and protocols

ea d

gateways.

G

et

C

er

tif

ie

Table D.2: OSI layers, devices, protocols

Copyright 2021 YCDA, LLC.

Appendix E—Glossary This glossary from the CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide

d

includes the key terms included in the SY0-601 objectives, along with some other relevant terms. CompTIA sometimes spell out acronyms in the objectives, and they sometimes use acronyms in test

ea

questions. This glossary often includes both spellings. As an example, you’ll see two entries for Advanced Encryption Standard (AES):

Ah

Advanced Encryption Standard (AES)—A symmetric algorithm used to encrypt data and provide confidentiality. AES is a block cipher, and it encrypts data in 128-bit blocks. It is quick, highly

secure, and used in a wide assortment of cryptography schemes. It includes key sizes of 128 bits, 192 bits, or 256 bits.

et

AES—Advanced Encryption Standard. A symmetric algorithm used to encrypt data and provide confidentiality. AES is a block cipher, and it encrypts data in 128-bit blocks. It is quick, highly

G

secure, and used in a wide assortment of cryptography schemes. It includes key sizes of 128 bits, 192 bits, or 256 bits.

This should make it easy for people to find either AES or Advanced Encryption Standard when

tif i

Numbers

ed

searching.

3DES—Triple Digital Encryption Standard. A symmetric algorithm used to encrypt data and provide

er

confidentiality. It is a block cipher that encrypts data in 64-bit blocks. It was originally designed as a replacement for DES, and is still used in some applications, such as when hardware doesn’t support AES.

C

802.1X— A port-based authentication protocol, also known as IEEE 802.1X. An authentication protocol used in VPNs and wired and wireless networks. VPNs often implement it as a RADIUS

et

server. Wired networks use it for port-based authentication. Wireless networks use it in Enterprise mode, and it often uses one of the EAP authentication protocols. Compare with EAP, PEAP, EAP-

G

TLS, and EAP-TTLS.

A

AAA—Authentication, Authorization, and Accounting. AAA protocols are used in remote access systems. For example, TACACS+ is an AAA protocol that uses multiple challenges and responses

during a session. Authentication verifies a user’s identification. Authorization determines if a user should have access. Accounting tracks a user’s access with logs. ABAC—Attribute-based access control. An access control scheme. ABAC grants access to resources based on attributes assigned to subjects and objects. Compare with DAC, MAC, role-based

d

access control, and rule-based access control. acceptable use policy (AUP)—A policy defining proper system usage and the rules of behavior for

ea

employees. It will often describe the purpose of computer systems and networks, how users can access

them, and the

Ah

access control vestibules—A physical security mechanism designed to control access to a secure

area. An access control vestibule prevents tailgating. It is a room, or even a building, with two doors that creates a large buffer area between the secure and unsecured areas. This was previously known as a mantrap.

et

access point (AP)—A device that connects wireless clients to wireless networks. Sometimes called a wireless access point (WAP).

G

account audit—An audit that analyzes user accounts and assigned privileges. It identifies the privileges (rights and permissions) granted to users, and compares them against what the users need.

ed

accounting—The process of tracking the activity of users and recording this activity in logs. One method of accounting is audit logs that create an audit trail. ACE—Access Control Entry. Identifies a user or group that is granted permission to a resource.

tif i

ACEs are contained within a DACL in NTFS.

ACK—Acknowledge. A packet in a TCP handshake. In a SYN flood attack, attackers send the SYN

er

packet but don’t complete the handshake after receiving the SYN/ACK packet. ACL—Access control list. Lists of rules used by routers and stateless firewalls. These devices use

C

the ACL to control traffic based on networks, subnets, IP addresses, ports, and some protocols. active reconnaissance—A penetration testing method used to collect information. It uses tools to send data to systems and analyzes responses, and gain knowledge on the target. Compare with

et

passive reconnaissance.

address resolution protocol (ARP) poisoning—An attack that misleads systems about the actual

G

MAC address of a system. ARP poisoning attacks can redirect traffic through an attacker’s system by sending false MAC address updates.

ad hoc—A connection mode used by wireless devices without an AP. When wireless devices

connect through an AP, they are using infrastructure mode. Compare with WiFi Direct.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

Advanced Encryption Standard (AES)—A symmetric algorithm used to encrypt data and provide confidentiality. AES is a block cipher, and it encrypts data in 128-bit blocks. It is quick, highly secure, and used in a wide assortment of cryptography schemes. It includes key sizes of 128 bits, 192 bits, or 256 bits.

d

advanced persistent threat (APT)—A group that has both the capability and intent to launch sophisticated and targeted attacks. A nation state (such as a foreign government) sponsored APTs.

ea

AES—Advanced Encryption Standard. A symmetric algorithm used to encrypt data and provide confidentiality. AES is a block cipher, and it encrypts data in 128-bit blocks. It is quick, highly

Ah

secure, and used in a wide assortment of cryptography schemes. It includes key sizes of 128 bits, 192 bits, or 256 bits.

AES-256—Advanced Encryption Standard 256 bit. AES sometimes includes the number of bits used in the encryption keys, and AES-256 uses 256-bit encryption keys.

et

affinity—A scheduling method used with load balancers. It uses the client’s IP address to ensure the client is redirected to the same server during a session.

G

agent—A NAC agent that is installed on a client. It checks the client for health and is sometimes called just an agent. Compare with agentless or dissolvable agent. agentless—A NAC agent that runs on a client, but deletes itself later. It checks the client for health

ed

and is the same as a dissolvable client. Compare with permanent agent. AH—Authentication Header. An option within IPsec to provide authentication and integrity. IPsec includes uses AH to provide authentication and integrity using HMAC. ESP provides confidentiality,

tif i

integrity, and authentication using HMAC and AES or 3DES. AH is identified with protocol ID number 51. Compare with IPSec and ESP.

er

air gap—A physical security control that provides physical isolation. Systems separated by an air gap (a gap of air) don’t typically have any physical connections to other systems. Sometimes spelled as

C

airgap.

ALE—Annualized (or annual) loss expectancy. The expected loss for a year. The ALE identifies the expected annual loss and is used to measure risk with ARO and SLE in a quantitative risk

et

assessment. The calculation is SLE × ARO = ALE. Compare with SLE and ARO. allow list—A list of applications that a system allows. Users are only able to install or run applications

G

on the list. Sometimes referred to as a whitelist. Compare with block list and deny list. annualized (or annual) loss expectancy (ALE)—The expected loss for a year. The ALE identifies

the expected annual loss and is used to measure risk with ARO and SLE in a quantitative risk assessment. The calculation is SLE × ARO = ALE. Compare with SLE and ARO.

Copyright 2021 YCDA, LLC v0.1

annualized (or annual) rate of occurrence (ARO)—The number of times a loss is expected to occur in a year. The ARO is used to measure risk with ALE and SLE in a quantitative risk assessment. The calculation is SLE × ARO = ALE. Compare with SLE and ALE. anomaly—A variance from a baseline. Some intrusion detection and intrusion prevention systems

d

detect attacks by comparing traffic against a baseline. It is also known as heuristic detection. anonymization—A process that removes PII from a data set. The goal is to remove any data from a

ea

data set to ensure that data can’t be traced back to an individual. Ideally, anonymization is

permanent, but if not done effectively, the process can be reversed. Compare with data masking,

Ah

pseudo-anonymization, and tokenization.

anti-malware—Software that protects systems from viruses and other malware. It protects against most malware, including viruses, Trojans, worms, and more. Compare with antivirus.

antivirus—Software that protects systems from malware. Although it is called antivirus software, it

et

protects against most malware, including viruses, Trojans, worms, and more. Compare with antimalware.

G

Anything as a Service (XaaS)—A cloud computing model. XaaS refers to any cloud computing model not identified in IaaS, PaaS, or SaaS models. Compare to IaaS, PaaS, and SaaS. wireless access point (WAP).

ed

AP—Access point. A device that connects wireless clients to wireless networks. Sometimes called a API—Application programming interface. A software module or component. An API gives developers access to features or data within another application, service, or operating system. APIs

tif i

or often used with web applications, Internet of Things (IoT) devices, and cloud-based services. API attacks—Application programming interface attacks. Attacks on an API. API attacks attempt to

er

discover and exploit vulnerabilities in APIs.

application programming interface (API)—A software module or component. An API gives

C

developers access to features or data within another application, service, or operating system. APIs or often used with web applications, Internet of Things (IoT) devices, and cloud-based services. application programming interface (API) attacks—Attacks on an API. API attacks attempt to

et

discover and exploit vulnerabilities in APIs.

APT—Advanced persistent threat. A group that has both the capability and intent to launch

G

sophisticated and targeted attacks. A nation state (such as a foreign government) sponsored APTs.

Argon2—A key stretching algorithm. Argon2 uses a password and salt that is passed through an

algorithm several times. This thwarts rainbow table attacks. Compare with Bcrypt and PBKDF2.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

ARO—Annualized (or annual) rate of occurrence. The number of times a loss is expected to occur in a year. The ARO is used to measure risk with ALE and SLE in a quantitative risk assessment. The calculation is SLE × ARO = ALE. Compare with SLE and ALE. arp—A command-line tool used to show and manipulate the Address Resolution Protocol (ARP) cache.

d

Compare with ARP. ARP—Address Resolution Protocol. Resolves IPv4 addresses to MAC addresses. Compare with arp.

ea

Address Resolution Protocol (ARP)—Resolves IPv4 addresses to MAC addresses. Compare with arp.

ARP poisoning—An attack that misleads systems about the actual MAC address of a system. ARP

Ah

poisoning attacks can redirect traffic through an attacker’s system by sending false MAC address updates.

ASCII—American Standard Code for Information Interchange. Code used to display characters. asset value—An element of a risk assessment. It identifies the value of an asset and can include any

et

product, system, resource, or process. The value can be a specific monetary value or a subjective value.

G

asymmetric encryption—A type of encryption using two keys to encrypt and decrypt data. It uses a public key and a private key. Compare with symmetric encryption. attestation—A process that checks and validates system files during the boot process. TPMs

ed

sometimes use remote attestation, sending a report to a remote system for attestation. audit trail—A record of events recorded in one or more logs. When security professionals have access to all the logs, they can re-create the events that occurred leading up to a security incident.

tif i

AUP—Acceptable use policy. A policy defining proper system usage and the rules of behavior for employees. It will often describe the purpose of computer systems and networks, how users can access

er

them, and the responsibilities of users when accessing the systems. authentication—The process that occurs when a user proves an identity. Users often claim an

C

identity with a username and prove the identity is theirs with a password. authentication attributes—Attributes that are sometimes used with authentication factors. They include somewhere you are, something you can do, something you exhibit, and someone you know.

et

Compare with somewhere you are, something you can do, something you exhibit, and someone you

know.

G

authentication factors—The different methods used for authentication. The common authentication

factors are something you know, such as a password or personal identification number (PIN),

something you have, such as a smart card, a phone, or a USB token, and something you are, such as a fingerprint or other biometric identification. Compare with authentication attributes, something you know, something you have, and something you are. Copyright 2021 YCDA, LLC v0.1

authorization—The process of granting access to resources for users who prove their based on their proven identity. Users typically claim an identity with a username and prove their identity with a password. availability—One of the three main goals of information security known as the CIA security triad.

d

Availability ensures that systems and data are up and operational when needed. Compare with

ea

confidentiality and integrity.

B

Ah

backdoor—An alternate method of accessing a system. Malware often adds a backdoor into a system after it infects it.

background check—A check into a person’s history, typically to determine eligibility for a job. banner grabbing—A method used to gain information about a remote system. It identifies the

et

operating system and other details on the remote system.

BCP—Business continuity plan. A plan that helps an organization predict and plan for potential

G

outages of critical services or functions. It includes disaster recovery elements that provide the steps used to return critical functions to operation after an outage. A BIA is a part of a BCP, and the BIA

ed

drives decisions to create redundancies such as failover clusters or alternate sites. Compare with BIA and DRP.

bcrypt—A key stretching algorithm. It is used to protect passwords. Bcrypt salts passwords with

tif i

additional bits before encrypting them with Blowfish. This thwarts rainbow table attacks. Compare with Argon2 and PBKDF2.

er

BIA—Business impact analysis. A process that helps an organization identify critical systems and components that are essential to the organization’s success. It identifies various scenarios that can impact these systems and components, maximum downtime limits, and potential losses from an

C

incident. The BIA helps identify RTOs and RPOs. Compare with BCP, BIA, DRP, RTO, and RPO. BIND—Berkeley Internet Name Domain. BIND is DNS software that runs on Linux and Unix

et

servers. Most Internet-based DNS servers use BIND. BIOS—Basic Input/Output System. A computer’s firmware used to manipulate different settings

G

such as the date and time, boot drive, and access password. UEFI is the designated replacement for BIOS. Compare with UEFI. birthday attack—A password attack named after the birthday paradox in probability theory. The

paradox states that for any random group of 23 people, there is a 50 percent chance that 2 of them have the same birthday.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

blockchain—A distributed, decentralized, public ledger. The word block refers to pieces of digital information (the ledger), and chain refers to a public database. Digital cryptocurrencies use blockchain technology. block cipher—An encryption method that encrypts data in fixed-sized blocks. Compare with stream

d

cipher. block list— A list of applications that a system blocks or denies. Users are unable to install or run any

ea

applications on the list. Also called deny list. Compare with allow list.

Blowfish—A strong symmetric block cipher. It encrypts data in 64-bit blocks and supports key sizes between 32 and 448 bits. Compare with Twofish. to nearby Bluetooth devices.

Ah

bluejacking—An attack against Bluetooth devices. It is the practice of sending unsolicited messages bluesnarfing—An attack against Bluetooth devices. Attackers gain unauthorized access to

et

Bluetooth devices and can access all the data on the device.

bluebugging—An attack against Bluetooth devices. Attackers gain full access to the phone and

G

installs a backdoor giving the attacker full access to the phone at any time. In addition to gaining full access to the phone, the attacker installs a backdoor.xml.

blue team—Personnel involved in cybersecurity readiness that are experts in defending systems.

ed

Compare with red team, purple team, white team and capture the flag. bollards—Short vertical posts that act as a barricade. Bollards block vehicles but not people. boot attestation—An entity verifies (or attests) that the boot files have not been modified. As an have changed.

tif i

example, a TPM supports a secure boot attestation process by first verifying none of the boot files

er

boot integrity—Processes that verify the integrity of the boot process for a system. Compare with measured boot, boot attestation, and hardware root of trust.

C

bots and botnets—Software robots that function automatically. A botnet is a group of computers that are joined together. Attackers often use malware to join computers to a botnet and then use the botnet to launch attacks.

et

braindump—A list of questions and answers for exams. They rarely have explanations and often

have incorrect answers. Braindump users are tricked into memorizing incorrect answers for

G

questions after memorizing them. They think they’re ready for the live exam, but they often fail the exam repeatedly without understanding why. Bridge Protocol Data Unit (BPDU) guard—A technology that detects false BPDU messages. False BPDU messages can indicate a switching loop problem and shut down switch ports. The BPDU guard detects false BPDU messages and blocks the BPDU attack. Copyright 2021 YCDA, LLC v0.1

bring your own device (BYOD)—A mobile device deployment model. A BYOD model allows employees to connect personally owned devices, such as tablets and smartphones, to a company network. Data security is often a concern with BYOD policies causing organizations to consider CYOD or COPE models. Compare with COPE and CYOD.

d

brute force—A password attack that attempts to guess a password. Online brute force attacks guess passwords of online systems. Offline attacks guess passwords contained in a file or database. than it expects. It exposes system memory that is normally inaccessible.

ea

buffer overflow—An error that occurs when an application receives more input, or different input,

Compare with shredding, pulping, pulverizing, and degaussing.

Ah

burning—A data sanitization process. Burning is typically performed within an incinerator.

business continuity plan (BCP)—A plan that helps an organization predict and plan for potential outages of critical services or functions. It includes disaster recovery elements that provide the steps

et

used to return critical functions to operation after an outage. A BIA is a part of a BCP, and the BIA drives decisions to create redundancies such as failover clusters or alternate sites. Compare with BIA

G

and DRP.

business impact analysis (BIA)—A process that helps an organization identify critical systems and components that are essential to the organization’s success. It identifies various scenarios that can

d

impact these systems and components, maximum downtime limits, and potential losses from an

ie

incident. The BIA helps identify RTOs and RPOs. Compare with BCP, BIA, DRP, RTO, and RPO. BYOD—Bring your own device. A mobile device deployment model. A BYOD model allows

er tif

employees to connect personally owned devices, such as tablets and smartphones, to a company network. Data security is often a concern with BYOD policies causing organizations to consider CYOD or COPE models. Compare with COPE and CYOD. Pass the First Time with Quality Practice Test Questions

C

https://gcgapremium.com/sy0-601-practice-test-questions/

et

C

G

CA—Certificate Authority. An organization that manages, issues, and signs certificates and is part

of a PKI. Certificates are an essential part of asymmetric encryption, and they include public keys and details on the owner of the certificate and the CA that issued the certificate. Certificate owners share their public key by sharing a copy of their certificate. Compare with PKI.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

CAPTCHA—Completely Automated Public Turing Test to Tell Computers and Humans Apart. Technique used to prevent automated tools from interacting with a website. Users must type in text often from a slightly distorted image. captive portal—A technical solution that forces wireless clients using web browsers to complete a

d

process before accessing a network. It is often used to ensure users agree to an acceptable use policy or pay for access.

ea

capture the flag—A competition involving cybersecurity personnel. Capture the flag (CTF) events vary depending on who is hosting the event but typically involved red teams, blue teams, purple

Ah

teams, and white teams. Compare with red team, blue team, purple team, and white team.

carrier unlocking—The process of unlocking a mobile phone from a specific cellular provider. CASB—Cloud access security broker. A software tool or service that enforces cloud-based security requirements. It is placed between the organization’s resources and the cloud, monitors all network

et

traffic, and can enforce security policies.

CBC—Cipher Block Chaining. A mode of operation used by some symmetric encryption ciphers. It

G

uses an IV for the first block and each subsequent block is combined with the previous block. CCMP—Counter Mode with Cipher Block Chaining Message Authentication Code Protocol. An encryption protocol based on AES and used with WPA2 for wireless security.

d

CCTV—Closed-circuit television. A detective control that provides video surveillance. Video

ie

surveillance provides reliable proof of a person’s location and activity. It is also a physical security control, and it can increase the safety of an organization’s assets.

er tif

CER—Canonical Encoding Rules. A base format for PKI certificates. They are ASCII encoded files. Compare with DER.

CERT—Computer Emergency Response Team. A group of experts who respond to security incidents.

C

certificate—A digital file used for encryption, authentication, digital signatures, and more. Public certificates include a public key used for asymmetric encryption. Certificate Authority (CA)—An organization that manages, issues, and signs certificates and is

et

part of a PKI. Certificates are an essential part of asymmetric encryption, and they include public

keys and details on the owner of the certificate and the CA that issued the certificate. Certificate

G

owners share their public key by sharing a copy of their certificate. Compare with PKI. share their public key by sharing a copy of their certificate. certificate chaining—A process that combines all certificates within a trust model. It includes all

the certificates in the trust chain from the root CA down to the certificate issued to the end user. Compare with certificate authority and intermediate CA. Copyright 2021 YCDA, LLC v0.1

certification revocation list (CRL)—A list of certificates that a Certificate Authority (CA) has revoked. Certificates are commonly revoked if they are compromised or issued to an employee who has left the organization. The CA that issued the certificate publishes a CRL, and a CRL is public. certificate signing request (CSR)—A method of requesting a certificate from a CA. It starts by

d

creating an RSA-based private/public key pair and then including the public key in the CSR. Most CAs require CSRs to be formatted using the Public-Key Cryptography Standards (PKCS) #10

ea

specification.

chain of custody—A process that provides assurances that evidence has been controlled and

Ah

handled properly after collection. Forensic experts establish a chain of custody when they first collect evidence.

change management—The process used to prevent unauthorized changes. Unauthorized changes often result in unintended outages.

et

CHAP—Challenge Handshake Authentication Protocol. An authentication mechanism where a server challenges a client. Compare with MS-CHAPv2 and PAP.

G

checksum—A type of a hash that is quick but not necessarily cryptographically secure. It is often used to validate the integrity of data. RAID-5 disks use checksum bits to verify that data on disks aren’t corrupt.

d

Choose your own device (CYOD)—A mobile device deployment model. Employees can connect

ie

their personally owned device to the network as long as the device is on a preapproved list. Note that the device is purchased by and owned by employees. Compare with BYOD and COPE.

er tif

CIA—Confidentiality, integrity, and availability. These three form the security triad. Confidentiality helps prevent the unauthorized disclosure of data. Integrity provides assurances that data has not been modified, tampered with, or corrupted. Availability indicates that data and services are available when needed.

C

CIO—Chief Information Officer. A “C” level executive position in some organizations. A CIO focuses on using methods within the organization to answer relevant questions and solve problems. ciphertext—The result of encrypting plaintext. Ciphertext is not in an easily readable format until it is

et

decrypted. Compare with plaintext.

clean desk space—A security policy requiring employees to keep their areas organized and free of

G

papers. The goal is to reduce threats of security incidents by protecting sensitive data. closed-circuit television (CCTV)—A detective control that provides video surveillance. Video

surveillance provides reliable proof of a person’s location and activity. It is also a physical security control, and it can increase the safety of an organization’s assets.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

cloud access security broker (CASB)—A software tool or service that enforces cloud-based security requirements. It is placed between the organization’s resources and the cloud, monitors all network traffic, and can enforce security policies. cloud deployment models—Cloud model types that identify who has access to cloud resources.

d

Public clouds are for any organization, and private clouds are for a single organization. Community clouds are shared among community organizations. A hybrid cloud is a combination of two or more

ea

clouds.

code reuse—Code reuse refers to reusing code instead of re-creating code that already exists. A

Ah

primary benefit is that existing code has already been tested, while new code may introduce new bugs.

code signing—The process of assigning a certificate to code. The certificate includes a digital signature and validates the code.

et

cold site—An alternate location for operations. A cold site will have power and connectivity needed for activation, but little else. Compare with hot site and warm site.

G

collision—A hash vulnerability that can be used to discover passwords. A hash collision occurs when two different passwords create the same hash. A collision attack attempts to find two different passwords that create the same hash.

ie

vulnerabilities and exposures.

d

Common Vulnerabilities and Exposures (CVE)—A dictionary of publicly known security compensating controls—Security controls that are alternative controls used when a primary

er tif

security control is not feasible. Compare with preventive, detective, corrective, deterrent, and physical security controls.

confidential data—Data meant to be kept secret among a certain group of people. As an example, salary data is meant to be kept secret and not shared with everyone within a company.

C

confidentiality—One of the core goals of information security sometimes referred to as the CIA security triad. Confidentiality ensures that unauthorized entities cannot access data. Encryption and access controls help protect against the loss of confidentiality. Compare with availability and

et

integrity.

containerization—A method used to isolate application and data in mobile devices. It isolates and

G

protects the application, including any data used by the application. It is useful when using the BYOD model because the container can be encrypted without encrypting the user’s data.

containers—A method used to isolate services or applications in virtual machines. Container

virtualization runs services or applications within isolated containers or application cells

Copyright 2021 YCDA, LLC v0.1

context-aware authentication—An authentication method using multiple elements to authenticate a user and a mobile device. It can include identity, geolocation, the device type, and more. Continuity of operations planning (COOP)—Continuity of operations planning sites provide an alternate location for operations after a critical outage. A hot site includes personnel, equipment,

d

software, and communication capabilities of the primary site with all the data up to date. A cold site will have power and connectivity needed for COOP activation, but little else. A warm site is a

ea

compromise between a hot site and a cold site. Compare with hot site, cold site, and warm site. control diversity—The use of different security control types, such as technical controls,

Ah

administrative controls, and physical controls. Compare with vendor diversity, technology diversity, and crypto diversity.

COOP—Continuity of operations planning. Continuity of operations planning sites provide an alternate location for operations after a critical outage. A hot site includes personnel, equipment,

et

software, and communication capabilities of the primary site with all the data up to date. A cold site will have power and connectivity needed for COOP activation, but little else. A warm site is a

G

compromise between a hot site and a cold site. Compare with hot site, cold site, and warm site. COPE—Corporate-owned, personally enabled. A mobile device deployment model. The organization purchases and issues devices to employees. Compare with BYOD and CYOD.

d

corporate-owned, personally enabled (COPE)—A mobile device deployment model. The

ie

organization purchases and issues devices to employees. Compare with BYOD and CYOD. corrective controls—Security controls that attempt to reverse the impact of a security incident.

er tif

Compare with preventive, detective, deterrent, compensating, and physical security controls. Compare with preventive, detective, corrective, deterrent, compensating, and physical security controls.

CRL—Certification revocation list. A list of certificates that a Certificate Authority (CA) has

C

revoked. Certificates are commonly revoked if they are compromised or issued to an employee who has left the organization. The CA that issued the certificate publishes a CRL, and a CRL is public. crossover error rate—The point where the false acceptance rate (FAR) crosses over with the false

et

rejection rate (FRR). A lower CER indicates a more accurate biometric system.

cross-site request forgery (XSRF)—A web application attack. Attackers use XSRF attacks to trick

G

users into performing actions on websites, such as making purchases, without their knowledge. In some cases, it allows an attacker to steal cookies and harvest passwords. cross-site scripting (XSS)— A web application vulnerability that allows attackers to inject scripts into

webpages. Attackers use XSS to capture user information such as cookies. Input validation

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

techniques on the server-side help prevent XSS attacks by blocking HTML and JavaScript tags. Many sites prevent the use of < and > characters to block cross-site scripting. crypto diversity—Using different methods to protect cryptographic keys. Compare with control diversity, vendor diversity, and technology diversity.

d

cryptomalware—A type of ransomware that encrypts the user’s data. CSF—Cybersecurity Framework. A framework that aligns with the RMF and can be used in the

ea

private sector. NIST SP 800-37, “Risk Management Framework for Information Systems and

Organizations” is targeted toward federal government agencies. The CSF is an alternative that fits

Ah

the private sector. It includes three components: the framework core, the framework implantation tiers, and the framework profiles.

CSR—Certificate signing request. A method of requesting a certificate from a CA. It starts by creating an RSA-based private/public key pair and then including the public key in the CSR. Most

et

CAs require CSRs to be formatted using the Public-Key Cryptography Standards (PKCS) #10 specification.

G

CTM—Counter mode. A mode of operation used for encryption that combines an IV with a counter. The combined result is used to encrypt blocks.

CTO—Chief Technology Officer. A “C” level executive position in some organizations. CTOs

d

focus on technology and evaluate new technologies.

ie

custom firmware—Mobile device firmware other than the firmware provided with the device. People sometimes use custom firmware to root Android devices.

er tif

CVE—Common Vulnerabilities and Exposures. A dictionary of publicly known security vulnerabilities and exposures.

Cybersecurity Framework (CSF)—A framework that aligns with the RMF and can be used in the private sector. NIST SP 800-37, “Risk Management Framework for Information Systems and

C

Organizations” is targeted toward federal government agencies. The CSF is an alternative that fits the private sector. It includes three components: the framework core, the framework implantation tiers, and the framework profiles.

et

cybersecurity resilience—A system’s ability to continue to operate even after an adverse event.

Resilience is similar to availability. However, availability tries to keep systems operational 100

G

percent of the time, which isn’t possible. In contrast, resilience expects systems to have outages and seeks to restore the system to full operation as soon as possible after the outage. Compare with

availability.

Copyright 2021 YCDA, LLC v0.1

CYOD—Choose your own device. A mobile device deployment model. Employees can connect their personally owned device to the network as long as the device is on a preapproved list. Note that the device is purchased by and owned by employees. Compare with BYOD and COPE.

d

D

ea

DAC—Discretionary access control. An access control scheme. All objects (files and folders) have

owners, and owners can modify permissions for the objects. Compare with ABAC, MAC, role-based access control, and rule-based access control.

Ah

data at rest—Any data stored on media. It’s common to encrypt sensitive data-at-rest.

data bias—A risk associated with machine learning and AI-enabled systems. People write algorithms, and sometimes people inadvertently insert their bias into their code and data used by their code. As an example, the Correctional Offender Management Profiling for Alternative

et

Sanctions (COMPAS) algorithm used in US court systems to predict recidivism reportedly produced twice as many false positives for black offenders (45%) than white offenders (23%). Compare with

G

tainted data.

data controller—A GDPR data role. The data controller determines how and why personal data

d

should be processed and typically delegates the data processing to a data processor. data custodian/steward—A GDPR data role. The data custodian (sometimes called a data steward)

ie

performs routine daily tasks such as storing and backing up data.

er tif

data owner—A GDPR data role. The data owner is most responsible for protecting privacy and user rights for any data owned by an organization. data processor—A GDPR data role. The data processor uses and manipulates data on behalf of the data controller.

data protection officer (DPO)—A GDPR data role. The DPO is responsible for ensuring the

C

organization complies with all relevant laws and acts as an independent advocate for customer data. Data Execution Prevention (DEP)—A security feature in some operating systems. DEP prevents

et

an application or service from executing in memory regions marked as nonexecutable. DEP can block some malware.

G

data exfiltration—The unauthorized transfer of data outside an organization. data in transit/motion—Any data sent over a network. It’s common to encrypt sensitive data in transit.

data in use—Any data currently being used by a computer. Because the computer needs to process the data, it is not encrypted while in use.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

data loss prevention (DLP)— A group of technologies used to prevent data loss. End-point DLP systems can prevent users from copying or printing sensitive data. Network-based DLP systems monitor outgoing email to detect and block unauthorized data transfers and monitor data stored in the cloud.

d

data masking—Modifying the data to hide the original content. Data masking replaces data with other data that looks valid but is inaccurate. For example, Homer can be replaced with Fred. Data

ea

masking creates data sets that used for testing. Compare with anonymization, pseudo-anonymization, and tokenization.

Ah

data minimization—A principle requiring organizations to limit the information they collect and use. Compare with data retention.

data retention policy—A security policy specifying how long data should be kept or retained. data sanitization—The process of destroying or removing all sensitive data from systems and

et

devices. Data sanitization methods include burning, shredding, pulping, pulverizing, and degaussing. data sovereignty—A term that refers to the legal implications of data stored in different countries. It

G

is primarily a concern related to backups stored in alternate locations via the cloud. DDoS—Distributed denial-of-service. An attack on a system launched from multiple sources. DDoS attacks consume a system’s resources resulting in resource exhaustion. DDoS attacks typically

d

include sustained, abnormally high network traffic. Compare to DoS.

ie

denial-of-service (DoS)—An attack from a single source. A DoS attack that attempts to disrupt the services provided by the attacked system. Compare to DDoS.

er tif

dead code—Code that is never executed or used. It is often caused by logic errors. defense in depth—The use of multiple layers of security to protect resources. Control diversity and vendor diversity are two methods organizations implement to provide defense in depth. degaussing—A data sanitization process. Degaussing removes data from magnetic media using a

C

powerful electronic magnet. Degaussing is sometimes used to remove data from backup tapes or to destroy hard disks. Compare with burning, shredding, pulping, and pulverizing. deny list— A list of applications that a system denies or blocks. Users are unable to install or run any

et

applications on the list. Also called block list. Compare with allow list.

DEP—Data Execution Prevention. A security feature in some operating systems. DEP prevents an

G

application or service from executing in memory regions marked as nonexecutable. DEP can block some malware.

DER—Distinguished Encoding Rules. A base format for PKI certificates. They are BASE64 binary encoded files. Compare with CER.

Copyright 2021 YCDA, LLC v0.1

detective controls—Security controls that attempt to detect security incidents after they have occurred. Compare with preventive, corrective, deterrent, compensating, and physical security controls. deterrent controls—Security controls that attempt to discourage individuals from causing a security

d

incident. Compare with preventive, detective, corrective, compensating, and physical security controls.

ea

DH—Diffie-Hellman. An asymmetric algorithm used to privately share symmetric keys. DH

Ephemeral (DHE) uses ephemeral keys, which are re-created for each session. Elliptic Curve DHE

Ah

(ECDHE) uses elliptic curve cryptography to generate encryption keys.

DHCP—Dynamic Host Configuration Protocol. A service used to dynamically assign TCP/IP configuration information to clients. DHCP is often used to assign IP addresses, subnet masks, default gateways, DNS server addresses, and much more.

et

DHCP snooping—A preventive measure used to prevent unauthorized DHCP servers. It is enabled on Layer 2 switch ports. When enabled, the switch only sends DHCP broadcast traffic (the DHCP

G

discover message) to trusted ports.

DHE—Diffie-Hellman Ephemeral. An alternative to traditional Diffie-Hellman. Instead of using static keys that stay the same over a long period, DHE uses ephemeral keys, which change for each

d

new session. Sometimes listed as EDH.

ie

Dictionary attack—A password attack that uses a file of words and character combinations. The attack tries every entry within the dictionary file when trying to guess a password.

er tif

differential backup—A type of backup. A differential backup will back up all the data that has changed or is different since the last full backup. Compare with incremental backup. Diffie-Hellman (DH)—An asymmetric algorithm used to privately share symmetric keys. DH Ephemeral (DHE) uses ephemeral keys, which are re-created for each session. Elliptic Curve DHE

C

(ECDHE) uses elliptic curve cryptography to generate encryption keys. dig—A Linux command-line tool. It is used to test DNS on Linux systems. Compare with nslookup. digital signature—An encrypted hash of a message, encrypted with the sender’s private key. It

et

provides authentication, non-repudiation, and integrity. Digital Signature Algorithm (DSA)—The algorithm used to create a digital signature. A digital

G

signature is an encrypted hash of a message. The sender’s private key encrypts the hash of the message to create the digital signature. The recipient decrypts the hash with the sender’s public key, and, if successful, it provides authentication, non-repudiation, and integrity. Authentication identifies the sender. Integrity verifies the message has not been modified. Non-repudiation is used with online

transactions and prevents the sender from later denying he sent the email.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

directory traversal attack—An attack that attempts to access a file or folder by entering the directory path. It is often used as part of an HTTP GET command. For example, the passwd file on Linux systems is within the ../etc/passwd path, and directory traversal attacks include some form of the ../etc/passwd path in the GET command.

d

disablement policy—A policy that identifies when administrators should disable user accounts. Accounts are disabled or deleted when an employee leave a company.

ea

disassociation attack—An attack that removes wireless clients from a wireless network. It forces wireless clients to connect with an AP again and allows attackers to capture the authentication

Ah

process.

disaster recovery plan (DRP)—A document designed to help a company respond to disasters, such as hurricanes, floods, and fires. It includes a hierarchical list of critical systems and often prioritizes services to restore after an outage. Testing validates the plan. The final phase of disaster recovery

et

includes a review to identify any lessons learned and may include an update of the plan. Compare with BCP and BIA.

G

discretionary access control (DAC)—An access control scheme. All objects (files and folders) have owners, and owners can modify permissions for the objects. Compare with ABAC, MAC, rolebased access control, and rule-based access control.

d

dissolvable agent—A NAC agent that runs on a client, but deletes itself later. It checks the client for

ie

health and is the same as agentless. Compare with permanent agent. distributed denial-of-service (DDoS)—An attack on a system launched from multiple sources.

er tif

DDoS attacks consume a system’s resources resulting in resource exhaustion. DDoS attacks typically include sustained, abnormally high network traffic. Compare to DoS. DLL—Dynamic-link library. A compiled set of code that can be called from other programs. DLL injection—An attack that injects a Dynamic Link Library (DLL) into memory and runs it.

C

Attackers rewrite the DLL, inserting malicious code. DLP—data loss prevention. A group of technologies used to prevent data loss. End-point DLP systems can prevent users from copying or printing sensitive data. Network-based DLP systems

et

monitor outgoing email to detect and block unauthorized data transfers and monitor data stored in the cloud.

G

DMZ—demilitarized zone. A buffer zone between the Internet and an internal network. It allows access to services while segmenting access to the internal network. Internet clients can access the services hosted on servers in the DMZ, but the DMZ provides a layer of protection for the internal network. CompTIA is using the term screened subnet to replace DMZ. Compare with screened subnet. Copyright 2021 YCDA, LLC v0.1

DNS—Domain Name System. Used to resolve hostnames to IP addresses. DNS zones include records such as A records for IPv4 addresses, AAAA records for IPv6 addresses, and MX records to identify mail servers. DNS uses UDP port 53 for DNS client queries and TCP port 53 for zone transfers. Compare with DNS poisoning and pharming.

d

DNS poisoning—An attack that modifies or corrupts DNS results. DNSSEC helps prevent DNS poisoning. protect the integrity of DNS records and prevent some DNS attacks.

ea

DNSSEC—Domain Name System Security Extensions. A suite of extensions to DNS used to

from the owner.

Ah

domain hijacking—An attack that changes the registration of a domain name without permission DoS—denial-of-service. An attack from a single source. A DoS attack attempts to disrupt the services provided by the attacked system. Compare to DDoS.

et

downgrade attack—A type of attack that forces a system to downgrade its security. The attacker then exploits the lesser security control.

G

DRP—disaster recovery plan. A document designed to help a company respond to disasters, such as hurricanes, floods, and fires. It includes a hierarchical list of critical systems and often prioritizes services to restore after an outage. Testing validates the plan. The final phase of disaster recovery

ie

with BCP and BIA.

d

includes a review to identify any lessons learned and may include an update of the plan. Compare DSA—Digital Signature Algorithm. The algorithm used to create a digital signature. A A digital

er tif

signature is an encrypted hash of a message. The sender’s private key encrypts the hash of the message to create the digital signature. The recipient decrypts the hash with the sender’s public key, and, if successful, it provides authentication, non-repudiation, and integrity. Authentication identifies the sender. Integrity verifies the message has not been modified. Non-repudiation is used with online

C

transactions and prevents the sender from later denying he sent the email. dumpster diving—The practice of searching through trash looking for information from discarded documents. Shredding or burning papers helps prevent the success of dumpster diving.

G

et

dynamic-link library (DLL)—A compiled set of code that can be called from other programs.

E

EAP—Extensible Authentication Protocol. An authentication framework that provides general guidance for authentication methods. Variations include EAP-TLS, EAP-TTLS, and PEAP.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

EAP-FAST—EAP-Flexible Authentication via Secure Tunneling. A Cisco-designed protocol sometimes used with 802.1X. EAP-FAST supports certificates, but they are optional. Compare with EAP, EAP-TLS, EAP-TTLS, and PEAP. EAP-TLS—Extensible Authentication Protocol-Transport Layer Security. An extension of EAP

d

sometimes used with 802.1X. This is one of the most secure EAP standards and is widely implemented. The primary difference between PEAP and EAP-TLS is that EAP-TLS requires certificates on the 802.1X

ea

server and on each of the wireless clients. Compare with EAP, EAP-TTLS, EAP-FAST, and PEAP.

EAP-TTLS—Extensible Authentication Protocol-Tunneled Transport Layer Security. An extension of

Ah

EAP sometimes used with 802.1X. It allows systems to use some older authentication methods such as PAP within a TLS tunnel. It requires a certificate on the 802.1X server but not on the clients. Compare with EAP, EAP-TLS, EAP-FAST, and PEAP.

ECC—Elliptic curve cryptography. An asymmetric encryption algorithm commonly used with smaller

et

wireless devices. It uses smaller key sizes and requires less processing power than many other encryption methods.

G

ECDHE—Elliptic Curve Diffie-Hellman Ephemeral. A version of Diffie-Hellman that uses ECC to generate encryption keys. Ephemeral keys are re-created for each session. elasticity—The ability of a system to handle an increased workload by dynamically scaling up or scaling

d

out as the need arise. A system may add more resources (such as more memory) when it suddenly

ie

experiences high demand. Scalability requires rebooting a server to add the resources, but elasticity dynamically adds the resources without rebooting the server. Compare with scalability.

er tif

electromagnetic interference (EMI)—Interference caused by motors, power lines, and fluorescent lights. EMI shielding prevents outside interference sources from corrupting data and prevents data from emanating outside the cable.

elliptic curve cryptography (ECC)—An asymmetric encryption algorithm commonly used with smaller

C

wireless devices. It uses smaller key sizes and requires less processing power than many other encryption methods.

Elliptic Curve Diffie-Hellman Ephemeral (ECDHE)—A version of Diffie-Hellman that uses ECC to

et

generate encryption keys. Ephemeral keys are re-created for each session.

embedded system—Any device that has a dedicated function and uses a computer system to

G

perform that function. It includes a CPU, an operating system, and one or more applications.

EMI—Electromagnetic interference. Interference caused by motors, power lines, and fluorescent lights. EMI shielding prevents outside interference sources from corrupting data and prevents data from emanating outside the cable.

Copyright 2021 YCDA, LLC v0.1

Encapsulating Security Protocol (ESP)—A part of IPsec that provides encryption. IPsec includes both AH and ESP. AH provides authentication and integrity using HMAC. ESP provides confidentiality, integrity, and authentication using HMAC and AES or 3DES. ESP is identified with protocol ID number 50.

d

encryption—A process that scrambles, or ciphers, data to make it unreadable. Encryption normally includes a public algorithm and a private key. Compare with asymmetric and symmetric encryption. with a username and password. Compare with Open and PSK modes.

ea

Enterprise—A wireless mode that uses an 802.1X server for security. It forces users to authenticate

Ah

entropy—The randomness of a cryptographic algorithm. A higher level of randomness results in a higher level of security when using the algorithm. A lack of entropy results in a weaker algorithm and makes it much easier for the algorithm to be cracked.

ephemeral key—A type of key used in cryptography. Ephemeral keys have short lifetimes and are

et

re-created for each session. In contrast, static keys are semi-permanent and stay the same over a long period of time.

G

error handling—A programming process that handles errors gracefully.

ESP—Encapsulating Security Protocol. A part of IPsec that provides encryption. IPsec includes both AH and ESP. AH provides authentication and integrity using HMAC. ESP provides confidentiality, integrity,

d

and authentication using HMAC and AES or 3DES. ESP is identified with protocol ID number 50. Compare with rogue AP.

ie

evil twin—A type of rogue AP. An evil twin has the same or similar SSID as a legitimate AP.

er tif

exit interview—An interview conducted with departing employees just before they leave an organization.

exploitation frameworks—Tools used to store information about security vulnerabilities. They are often used by penetration testers (and attackers) to detect and exploit software.

C

Extensible Authentication Protocol (EAP)—An authentication framework that provides general guidance for authentication methods. Compare with EAP-TLS, EAP-TTLS, EAP-FAST, and PEAP. Extensible Authentication Protocol-Transport Layer Security (EAP-TLS)—An extension of EAP

et

sometimes used with 802.1X. This is one of the most secure EAP standards and is widely implemented. The primary difference between PEAP and EAP-TLS is that EAP-TLS requires certificates on the 802.1X

G

server and on each of the wireless clients. Compare with EAP, EAP-TTLS, EAP-FAST, and PEAP. Extensible Authentication Protocol-Tunneled Transport Layer Security (EAP-TTLS)—. An

extension of EAP sometimes used with 802.1X. It allows systems to use some older authentication methods such as PAP within a TLS tunnel. It requires a certificate on the 802.1X server but not on the clients. Compare with EAP, EAP-TLS, EAP-FAST, and PEAP.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

Extensible Markup Language (XML)—A language used by many databases for inputting or exporting data. XML uses formatting rules to describe the data. extranet—The part of an internal network shared with outside entities. Extranets are often used to provide access to authorized business partners, customers, vendors, or others. Compare with

ea

d

intranet.

F

Ah

facial recognition— A biometric authentication system. Facial recognition systems identify people based on facial features.

factors of authentication—The different methods used for authentication. The common

authentication factors are something you know, such as a password or personal identification number

et

(PIN), something you have, such as a smart card, a phone, or a USB token, and something you are, such as a fingerprint or other biometric identification. Compare with authentication attributes,

G

something you know, something you have, and something you are.

false acceptance—A biometric error. It indicates a biometric system incorrectly accepted an result in a true acceptance.

d

unknown user as if the user was known. If the biometric system was working correctly, it would

ie

false acceptance rate (FAR)—Also called the false match rate. A rate that identifies the percentage

er tif

of times a biometric authentication system incorrectly indicates a match. false negative—A security incident that isn’t detected or reported. As an example, a NIDS false negative occurs if an attack is active on the network, but the NIDS does not raise an alert. A false negative on a vulnerability scanner indicates a vulnerability exists, but the vulnerability scanner didn’t detect it.

C

false positive—An alert on an event that isn’t a security incident. As an example, a NIDS false positive occurs if the NIDS raises an alert but activity on the network is normal. A false positive on a

et

vulnerability scanner indicates a vulnerability scanner detected a vulnerability, but a vulnerability doesn’t exist.

G

false rejection—A biometric error. It indicates a biometric system incorrectly rejected a valid user. If the biometric system was working correctly, it would result in a true acceptance. As an example, a NIDS false negative occurs if an attack is active on the network but the NIDS does not raise an alert. A false negative in a biometric system

Copyright 2021 YCDA, LLC v0.1

FAR—False acceptance rate. Also called the false match rate. A rate that identifies the percentage of times a biometric authentication system incorrectly indicates a match. Faraday cage—A room or enclosure that prevents signals from emanating beyond the room or enclosure. way, the system can tolerate the fault as if it never occurred.

ea

FDE—Full disk encryption. A method to encrypt an entire disk. Compare with SED.

d

fault tolerance—The capability of a system to suffer a fault, but continue to operate. Said another

federation—Two or more members of a federated identity management system. Used for single

Ah

sign-on.

File Transfer Protocol (FTP)—Used to upload and download files to an FTP server. FTP uses TCP ports 20 and 21. Secure FTP (SFTP) uses SSH for encryption on TCP port 22. FTP Secure (FTPS) uses SSL or TLS for encryption.

et

File Transfer Protocol Secure (FTPS)—An extension of FTP that uses SSL to encrypt FTP traffic. Some implementations of FTPS use TCP ports 989 and 990.

G

fingerprint scanners—A biometric authentication system. Fingerprint scanners scan fingerprints for authentication.

firewall—A software or a network device used to filter traffic. Firewalls can be host-based (running as an

d

application on a host) or network-based. Stateless firewalls filter traffic using rules within an ACL.

ie

firmware OTA updates—Over-the-air updates for mobile device firmware that keep them up to date. These are typically downloaded to the device from the Internet and applied to update the device.

er tif

forward proxy server—A server used to forward requests for services such as HTTP or HTTPS. All internal clients send their outgoing requests to the proxy server, and the proxy server sends the requests to the Internet server. Proxy servers increase performance by caching web pages and can filter URLs. A forward proxy server is commonly called a proxy server. Compare with reverse proxy

C

server.

framework—A structure used to provide a foundation. Cybersecurity frameworks typically use a structure of basic concepts and provide guidance to professionals on how to implement security.

et

FRR—False rejection rate. Also called the false nonmatch rate. A rate that identifies the percentage

of times a biometric authentication system incorrectly rejects a valid match.

G

FTP—File Transfer Protocol. Used to upload and download files to an FTP server. FTP uses TCP ports 20 and 21. Secure FTP (SFTP) uses SSH for encryption on TCP port 22. FTP Secure (FTPS) uses SSL or TLS for encryption.

FTPS—File Transfer Protocol Secure. An extension of FTP that uses SSL to encrypt FTP traffic. Some implementations of FTPS use TCP ports 989 and 990.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

full backup—A type of backup that backs up all the selected data. A full backup could be considered a normal backup. full disk encryption (FDE)—A method to encrypt an entire disk. Compare with SED. full tunnel—An encrypted connection used with VPNs. When a user is connected to a VPN, all Pass the First Time with Quality Practice Test Questions

ea

https://gcgapremium.com/sy0-601-practice-test-questions/

d

traffic from the user is encrypted. Compare with split tunnel.

Ah

G

gamification—A training method that increases participation and interaction. Gamification intertwines game-design elements within user training methods. Some gamification techniques

et

include a sense of competition, such as capture the flag competitions.

GCM—Galois/Counter Mode. A mode of operation used for encryption. It combines the Counter

G

(CTM) mode with hashing techniques for data authenticity and confidentiality. GDPR—General Data Protection Regulation. The GDPR is a European Union (EU) regulation that

d

clarifies requirements to protect the personal data of anyone living in the EU. It also defines the roles protection officer (DPO).

ie

of data owners, data controllers, data processors, data custodians or data stewards, and the data

er tif

General Data Protection Regulation—A European Union (EU) regulation that clarifies requirements to protect the personal data of anyone living in the EU. It defines the roles of data owners,

data controllers, data processors, data custodians or data stewards, and the data protection officer (DPO).

C

geofencing—A virtual fence or geographic boundary. It uses GPS to create the boundary. Apps can then respond when a mobile device is within the virtual fence.

et

geolocation—The location of a device identified by GPS. It can help locate a lost or stolen mobile

device.

G

Global Positioning System (GPS)—A satellite-based navigation system that identifies the location of a device or vehicle. Mobile devices often incorporate GPS capabilities.

GPS—Global Positioning System. A satellite-based navigation system that identifies the location of a

device or vehicle. Mobile devices often incorporate GPS capabilities.

Copyright 2021 YCDA, LLC v0.1

GPS tagging—A process of adding geographical data to files such as pictures. It typically includes latitude and longitude coordinates of the location where the photo was taken, or the file was created. group-based access control—A role-based access control method that uses groups as roles. Guest account—A pre-created account in Windows systems. It is disabled by default.

ea

d

H

hacktivist—An attacker who launches attacks as part of an activist movement or to further a cause.

hardware root of trust—A known secure starting point for an operating system. A TPM ships with

Ah

a matched key pair used for encryption, and this key pair provides a hardware root of trust.

hardware security module (HSM)—A removable or external device that can generate, store, and manage RSA keys used in asymmetric encryption. High-volume e-commerce sites use HSMs to increase the performance of TLS sessions. Compare with TPM.

et

hash—A number created by executing a hashing algorithm against data, such as a file or message. Hashing is commonly used for integrity. Common hashing algorithms are MD5, SHA-3, and

G

HMAC.

heat map—A graph that plots risks onto a graph or chart using color-coding. Compare with risk

d

matrix.

heuristic/behavioral—A type of monitoring on intrusion detection and intrusion prevention

ie

systems. It detects attacks by comparing traffic against a baseline. It is also known as anomaly

er tif

detection.

HIDS—Host-based intrusion detection system. Software installed on a system to detect attacks. A HIDS is used to monitor an individual server or workstation. It protects local resources on the host such as the operating system files, and in some cases, it can detect malicious activity missed by antivirus software. Compare with HIPS, NIDS, and NIPS.

C

high availability—A term that indicates a system or component remains available close to 100 percent of the time. Five nines indicates a system is up and operation 99.999 percent of the time.

et

Compare with availability and resilience.

HIPS—Host-based intrusion prevention system. An extension of a host-based IDS. It is designed to

G

react in real time to detect, and prevent, an attack in action. Compare with HIDS, NIDS, and NIPS.

HMAC—Hash-based Message Authentication Code. A hashing algorithm used to verify integrity

and authenticity of a message with the use of shared secret. When used with TLS and IPsec, HMAC is combined with MD5 and SHA-1 as HMAC-MD5 and HMAC-SHA1, respectively.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

HMAC-based One-Time Password (HOTP)—An open standard used for creating one-time passwords, similar to those used in tokens or key fobs. It combines a secret key and an incrementing counter, and then uses HMAC to create a hash of the result. HOTP passwords do not expire until they are used. Compare with TOTP.

d

hoax—A message, often circulated through email, that tells of impending doom from a virus or other security threat that simply doesn’t exist.

ea

homomorphic encryption—A processes that allows data to remain encrypted while it is being

processed. Most homomorphic encryption methods work best when data is stored and manipulated

Ah

as integers.

honeyfile—A file designed to attract an attacker. As an example, a file named passwords.text might attract the attention of an attacker. It doesn’t contain valid passwords. Compare with honeypot and honeynet.

et

honeynet—A group of honeypots in a network. Honeynets are often configured in virtual networks. Honeypots within a honeynet have weakened security and are designed to attact attackers. Compare

G

with honeypot and honeyfile.

honeypot—A server designed to attract an attacker. It typically has weakened security encouraging attackers to investigate it. Compare with honeyfile and honeynet.

d

host-based intrusion detection system (HIDS)—Software installed on a system to detect attacks. A

ie

HIDS is used to monitor an individual server or workstation. It protects local resources on the host such as the operating system files, and in some cases, it can detect malicious activity missed by

er tif

antivirus software. Compare with HIPS, NIDS, and NIPS. host-based intrusion prevention system (HIPS)—An extension of a host-based IDS. It is designed to react in real time to detect, and prevent, an attack in action. Compare with HIDS, NIDS, and NIPS. hot and cold aisles—A method commonly used in data centers to keep equipment cool. Cool air

C

flows from the front of the cabinets to the back, making the front aisle cooler and the back aisle warmer.

HOTP—HMAC-based One-Time Password. An open standard used for creating one-time

et

passwords, similar to those used in tokens or key fobs. It combines a secret key and an incrementing counter, and then uses HMAC to create a hash of the result. HOTP passwords do not expire until

G

they are used. Compare with TOTP.

hot site—An alternate location for operations. A hot site typically includes everything needed to be

operational within 60 minutes. Compare with cold site and warm site.

Copyright 2021 YCDA, LLC v0.1

HSM—Hardware security module. A removable or external device that can generate, store, and manage RSA keys used in asymmetric encryption. High-volume e-commerce sites use HSMs to increase the performance of TLS sessions. Compare with TPM. HTML—Hypertext Markup Language. Language used to create webpages. HTML documents are

d

displayed by web browsers and delivered over the Internet using HTTP or HTTPS. It uses less-than and greater-than characters (< and >) to create tags. Many sites use input validation to block these

ea

tags and prevent cross-site scripting attacks.

HTTP—Hypertext Transfer Protocol. Used for web traffic on the Internet and in intranets. HTTP

Ah

uses TCP port 80. HTTP is almost always encrypted with TLS and referred to as HTTPS.

HTTPS—Hypertext Transfer Protocol Secure. A protocol used to encrypt HTTP traffic. HTTPS encrypts HTTP traffic with TLS using TCP port 443.

HVAC—Heating, ventilation, and air conditioning. A physical security control that increases

et

availability by regulating airflow within data centers and server rooms. They use hot and cold aisles to regulate the cooling, thermostats to ensure a relatively constant temperature, and humidity

G

controls to reduce the potential damage from condensation.

Hypertext Markup Language (HTML)—Language used to create webpages. HTML documents are displayed by web browsers and delivered over the Internet using HTTP or HTTPS. It uses less-

d

than and greater-than characters (< and >) to create tags. Many sites use input validation to block

er tif

ie

these tags and prevent cross-site scripting attacks.

I

IaaS—Infrastructure as a Service. A cloud computing model. IaaS allows an organization to rent

C

access to hardware in a self-managed platform. Customers are responsible for keeping an IaaS system up to date. Compare to PaaS, SaaS, and XaaS.

et

ICMP—Internet Control Message Protocol. Used for diagnostics such as ping. Many DoS attacks use ICMP. It is common to block ICMP at firewalls and routers. If ping fails, but other connectivity

G

to a server succeeds, it indicates that ICMP is blocked.

ICS—Industrial control system. A system that controls large systems such as power plants or water

treatment facilities. A SCADA system typically controls an ICS. Compare with SCADA. identification—The process that occurs when a user claims an identity, such as with a username.

Users prove their identity with other credentials, such as with a password.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

IDS—Intrusion detection system. A detective control used to detect attacks after they occur. A network-based IDS (NIDS) monitors a network, and a host-based IDS (HIDS) monitors a host. They both monitor for intrusions and provides ongoing protection against various threats. IDSs include sniffing capabilities. Many IDSs use numbering systems to identify vulnerabilities. Compare with

d

IPS. IEEE—Institute of Electrical and Electronics Engineers. IEEE is an international organization with

ea

a focus on electrical, electronics, and information technology topics. IEEE standards are well respected and followed by vendors around the world.

Ah

IEEE 802.1X—A port-based authentication protocol. An authentication protocol used in VPNs and wired and wireless networks. VPNs often implement it as a RADIUS server. Wired networks use it for port-based authentication. Wireless networks use it in Enterprise mode, and it often uses one of the EAP authentication protocols. Compare with EAP, PEAP, EAP-TLS, and EAP-TTLS.

et

ifconfig—A command-line tool. The ifconfig tool is used on Linux systems to show and manipulate settings on a network interface card (NIC). Sit is similar to ipconfig used on Windows systems.

G

IGMP—Internet Group Management Protocol. Used for multicasting. Computers belonging to a multicasting group have a multicasting IP address in addition to a standard unicast IP address. IIS—Internet Information Services. A Microsoft Windows web server. IIS comes free with

d

Microsoft Windows Server products. Linux systems use Apache as a web server.

ie

IMAP4—Internet Message Access Protocol v4. Used to store email on servers and allow clients to manage their email on the server. IMAP4 uses TCP port 143. Secure IMAP4 uses TLS to encrypt IMAP4

er tif

traffic on TCP port 993.

impact—The magnitude of harm related to a risk. It is the negative result of an event, such as the loss of confidentiality, integrity, or availability of a system or data. Compare with likelihood of occurrence and qualitative risk assessment.

C

implicit deny—A rule in an ACL that blocks all traffic that hasn’t been explicitly allowed. The implicit deny rule is the last rule in an ACL. incident—An adverse event or series of events that can negatively affect the confidentiality,

et

integrity, or availability of an organization’s information technology (IT) systems and data.

Sometimes referred to as a security incident.

G

incident response. The process of responding to a security incident. Organizations often create an

incident response plan that outlines the procedures to be used when responding to an incident. incident response plan—A formal, coordinated plan that personnel can use when responding to an incident. It typically includes definitions of incident types, details on an incident response team, and team members’ roles and responsibilities. Copyright 2021 YCDA, LLC v0.1

incident response process—The phases of incident response. It includes preparation, identification, containment, eradication, recovery, and lessons learned. incident response team—A group of experts who respond to security incidents. It includes employees with expertise in different areas. changed since the last full or incremental backup. Compare with differential backup.

d

incremental backup—A type of backup. An incremental backup backs up all the data that has

ea

Infrastructure as a Service (IaaS)—A cloud computing model. IaaS allows an organization to rent access to hardware in a self-managed platform. Customers are responsible for keeping an IaaS

Ah

system up to date. Compare to PaaS, SaaS, and XaaS.

initialization vector (IV)—An IV provides randomization of encryption keys to help ensure that keys are not reused. In an IV attack, the attacker uses packet injection to increase the number of packets to analyze and discovers the encryption key.

et

initialization vector (IV) attack—A wireless attack that attempts to discover the IV. Legacy wireless security protocols are susceptible to IV attacks.

G

injection attack—An attack that injects code or commands. Common injection attacks are dynamic link library (DLL) injection, command injection, and SQL injection, and XML injection attacks. inline—A configuration that forces traffic to pass through a device. A NIPS is placed inline, allowing

d

it to prevent malicious traffic from entering a network. Sometimes called in-band. Compare with out-of-

ie

band.

input validation—A programming process that verifies data is valid before using it. Input validation

er tif

prevents many web-based attacks such as buffer overflow attacks, SQL injection attacks, and crosssite scripting attacks.

insider threat—An attacker who launches attacks from within an organization, typically as an employee.

C

integer overflow—An application attack that attempts to use or create a numeric value that is too big for an application to handle. Input handling and error handling thwart the attack. integrity—One of the core goals of information security sometimes referred to as the CIA security

et

triad. Integrity provides assurance that data or system configurations have not been modified. Audit logs and hashing are two methods used to ensure integrity. Compare with availability and

G

confidentiality.

intermediate CA—intermediate certificate authority. A CA created by a root CA that can issue

certificates and/or create child CAs that issue certificates. Compare with certificate authority and

certificate chaining.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

Internet Message Access Protocol v4 (IMAP4)—Used to store email on servers and allow clients to manage their email on the server. IMAP4 uses TCP port 143. Secure IMAP4 uses TLS to encrypt IMAP4 traffic on TCP port 993.

Internet of things (IoT)—The network of physical devices connected to the Internet. It typically refers

d

to smart devices with an IP address, such as wearable technology and home automation systems. intranet—An internal network. People use an intranet to communicate and share content with each

ea

other on an internal network. Compare with extranet.

IoT—Internet of things. The network of physical devices connected to the Internet. It typically refers to

Ah

smart devices with an IP address, such as wearable technology and home automation systems. IP—Internet Protocol. Used for addressing. Compare with IPv4 and IPv6.

ipconfig—A command-line tool. It is used on Windows systems to show the configuration settings on a NIC.

et

IPS—Intrusion prevention system. A preventive control that can stop an attack in progress. It is similar to an active IDS except that it’s placed inline with traffic. An IPS can actively monitor data

G

streams, detect malicious content, and stop attacks in progress. It can be used internally to protect private networks, such as those holding SCADA equipment. Compare with IDS. IPsec—Internet Protocol security. A suite of protocols used to encrypt data-in-transit. IPSec can

d

operate in both Tunnel mode and Transport mode. IPsec is built into IPv6, but can also work with

ie

IPv4. Both versions support AH and ESP. AH provides authentication and integrity using HMAC, and ESP provides confidentiality, integrity, and authentication using HMAC and AES or 3DES.

er tif

Compare with AH, ESP, tunnel mode, and transport mode. IP spoofing—An attack that changes the source IP address. IP spoofing makes an attack appear as though it’s coming from a different source.

IPv4—Internet Protocol version 4. Identifies hosts using a 32-bit IP address. IPv4 is expressed in

C

dotted decimal format with decimal numbers separated by dots or periods like this: 192.168.1.1. IPv6—Internet Protocol version 6. Identifies hosts using a 128-bit address. IPv6 has a significantly larger address space than IPv4. IPsec is built in to IPv6 and can encrypt any type of IPv6 traffic.

et

iris scanners—A biometric system. Iris scanners scan the iris of an eye for authentication. ISP—Internet Service Provider. A company that provides Internet access to customers.

G

IT—Information technology. Computer systems and networks used within organizations. IV—Initialization vector. An IV provides randomization of encryption keys to help ensure that keys

are not reused. In an IV attack, the attacker uses packet injection to increase the number of packets to analyze and discovers the encryption key.

Copyright 2021 YCDA, LLC v0.1

J allows a user to install software from any third-party source. Compare with rooting.

d

jailbreaking—The process of modifying an Apple mobile device to remove software restrictions. It

by a wireless network.

ea

jamming—A DoS attack against wireless networks. It transmits noise on the same frequency used

job rotation—A process that ensures employees rotate through different jobs to learn the processes and

Ah

procedures in each job. It can sometimes detect fraudulent activity.

Pass the First Time with Quality Practice Test Questions

et

https://gcgapremium.com/sy0-601-practice-test-questions/

G

K

KDC—Key Distribution Center. Also known as Ticket Granting Ticket (TGT) server. Part of the Kerberos protocol used for network authentication. The KDC issues timestamped tickets that expire.

d

Kerberos—A network authentication mechanism used with Windows Active Directory domains and

ie

some Unix environments known as realms. It uses a KDC to issue tickets. kernel—The central part of the operating system. In container virtualization, guests share the kernel.

er tif

key escrow—The process of placing a copy of a private key in a safe environment. If the original key is lost, an organization can retrieve a copy of the key to access the data. key exchange—A cryptographic method used to share cryptographic keys. asymmetric encryption uses key exchange to share a symmetric key.

C

keylogger—Software or hardware used to capture a user’s keystrokes. Keystrokes are stored in a file and can be manually retrieved or automatically sent to an attacker. key stretching—A technique used to increase the strength of stored passwords. It adds additional bits

et

(called salts) and can help thwart brute force and rainbow table attacks. known environment test—A type of penetration test. Testers have full knowledge of the

G

environment prior to starting the test. This was previously known as a white box test. Compare with unknown environment test and partially known environment test.

known plaintext—A cryptographic attack that decrypts encrypted data. In this attack, the attacker

knows the plaintext used to create ciphertext. Compare with ciphertext and plaintext.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

L L2TP—Layer 2 Tunneling Protocol. Tunneling protocol used with VPNs. L2TP is commonly used with IPsec (L2TP/IPsec) and uses UDP port 1701. can be physical labels, such as on backup tapes, or digital labels embedded in files.

d

labeling—The process of ensuring data is tagged clearly so that users know its classification. Labels

ea

Layer 2 Tunneling Protocol (L2TP)—Tunneling protocol used with VPNs. L2TP is commonly used with IPsec (L2TP/IPsec) and uses UDP port 1701.

Ah

LDAP—Lightweight Directory Access Protocol. A protocol used to communicate with directories such as Microsoft Active Directory. It identifies objects with query strings using codes such as CN=Users and DC=GetCertifiedGetAhead. LDAP uses TCP port 389. LDAP injection attacks attempt to access or modify data in directory service databases. Compare with LDAPS.

et

LDAPS—Lightweight Directory Access Protocol over SSL. A protocol used to encrypt LDAP traffic with TLS. While it has SSL in the name, TLS has replaced SSL. LDAPS is sometimes

G

referred to as Lightweight Directory Access Protocol Secure. LDAPS encrypts transmissions with TLS over TCP port 636. Compare with LDAP.

least privilege—A security principle that minimizes privileges given to individuals. The lease

d

privilege principle specifies that individuals and processes are granted only the rights and permissions

ie

needed to perform assigned tasks or functions, but no more. legal hold—A court order to maintain data for evidence.

er tif

lightweight cryptography—Cryptography deployed to smaller devices. Many Internet of Things (IoT) devices use lightweight cryptography.

Lightweight Directory Access Protocol (LDAP)—A protocol used to communicate with directories such as Microsoft Active Directory. It identifies objects with query strings using codes

C

such as CN=Users and DC=GetCertifiedGetAhead. LDAP uses TCP port 389. LDAP injection attacks attempt to access or modify data in directory service databases. Compare with LDAPS. Lightweight Directory Access Protocol over SSL (LDAPS)—A protocol used to encrypt LDAP

et

traffic with TLS. While it has SSL in the name, TLS has replaced SSL. LDAPS is sometimes referred to as Lightweight Directory Access Protocol Secure. LDAPS encrypts transmissions with

G

TLS over TCP port 636. Compare with LDAP.

likelihood of occurrence—The probability that something will occur. It is used with impact in a

qualitative risk assessment. Compare with impact and qualitative risk assessment. load balancer—Hardware or software that balances the load between two or more servers. Load

balancers add redundancy and fault tolerance and can help eliminate single points of failure. Copyright 2021 YCDA, LLC v0.1

logic bomb—A type of malware that executes in response to an event. The event might be a specific date or time, or a user action such as when a user launches a specific program. loop prevention—Methods used to prevent switching loop or bridge loop problems. Both STP and RSTP prevent switching loops.

ea

d

M

MAC—Mandatory Access Control. An access control scheme. MAC uses sensitivity labels assigned to objects (files and folders) and subjects (users). MAC restricts access based on a need to know.

Ah

Compare with ABAC, DAC, role-based access control, and rule-based access control.

MAC—media access control. A 48-bit address used to identify network interface cards. It is also called a hardware address or a physical address. and is commonly displayed as six pairs of hexadecimal characters. Port security on a switch or an AP can limit access using MAC filtering.

et

MAC cloning attack—An attack that changes the source MAC address to impersonate an authorized system. When MAC filtering is used, attackers can discover the address of authorized

G

MAC addresses, and change their address to bypass MAC filtering. This is sometimes called MAC spoofing.

d

MAC filtering—A form of network access control to allow or block access based on the MAC address. It is configured on switches for port security or on APs for wireless security.

ie

MAC flooding—An attack against a switch that attempts to overload it. Most ports on a switch have

er tif

only a single host connected to them, with only a single MAC address. A MAC flooding attack repeatedly spoofs the MAC address. If successful, the switch operates as a hub instead of as a switch.

malware—Malicious software. It includes a wide range of software that has malicious intent, such as viruses, worms, ransomware, rootkits, logic bombs, and more.

C

managerial controls— Security controls implemented via managerial or administrative or methods. They are typically documented in an organization’s security policy and focus on managing risk.

et

Compare with technical and operational controls. Mandatory Access Control (MAC)—An access control scheme. MAC uses sensitivity labels

G

assigned to objects (files and folders) and subjects (users). MAC restricts access based on a need to know. Compare with ABAC, DAC, role-based access control, and rule-based access control. mandatory vacation—A policy that forces employees to take a vacation. The goal is to deter

malicious activity, such as fraud and embezzlement, and detect malicious activity when it occurs.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

MD5—Message Digest 5. A hashing function used to provide integrity. MD5 creates 128-bit hashes, which are also referred to as MD5 checksums. A hash is simply a number created by applying the algorithm to a file or message at different times. Comparing the hashes verifies integrity. Experts consider MD5 cracked and discourage its use as a cryptographic hash. However, it is still used as a

d

checksum in some situations. MDM—Mobile device management. A group of applications and technologies used to manage

ea

mobile devices. MDM tools can monitor mobile devices and ensure they are in compliance with security policies.

Ah

measured boot—A process that verifies the integrity of the boot process. It completes these checks before allowing the user to interact with the system.

media access control (MAC) flooding—An attack against a switch that attempts to overload it. Most ports on a switch have only a single host connected to them, with only a single MAC address.

et

A MAC flooding attack repeatedly spoofs the MAC address. If successful, the switch operates as a hub instead of as a switch.

G

Memorandum of understanding (MOU)—A type of agreement that defines the responsibilities of each party. Sometimes called a memorandum of agreement.

memory leak—An application flaw that consumes memory without releasing it. In extreme cases,

d

the application can consume so much memory that the operating system crashes

ie

Message Digest 5 (MD5)—A hashing function used to provide integrity. MD5 creates 128-bit hashes, which are also referred to as MD5 checksums. A hash is simply a number created by

er tif

applying the algorithm to a file or message at different times. Comparing the hashes verifies integrity. Experts consider MD5 cracked and discourage its use as a cryptographic hash. However, it is still used as a checksum in some situations. MMS—Multimedia Messaging Service. An extension of SMS. MMS allows users to include

C

multimedia content such as pictures, short videos, audio, or even a slideshow of multiple images. Compare with SMS and Rich Communication Services. Mobile device management (MDM)—A group of applications and technologies used to manage

et

mobile devices. MDM tools can monitor mobile devices and ensure they are in compliance with security policies.

G

MS-CHAP—Microsoft Challenge Handshake Authentication Protocol. Microsoft implementation of

CHAP. MS-CHAPv2 improves MS-CHAP by providing mutual authentication. MS-CHAPv2—Microsoft Challenge Handshake Authentication Protocol version 2. Microsoft implementation of CHAP. MS-CHAPv2 provides mutual authentication. Compare with CHAP and PAP. Copyright 2021 YCDA, LLC v0.1

MTBF—Mean time between failures. Provides a measure of a system’s reliability and is usually represented in hours. The MTBF identifies the average (the arithmetic mean) time between failures. Higher MTBF numbers indicate a higher reliability of a product or system. MTTF—Mean time to failure. The length of time you can expect a device to remain in operation

d

before it fails. It is similar to MTBF, but the primary difference is that the MTBF metric indicates you can repair the device after it fails. The MTTF metric indicates that you will not be able to repair

ea

a device after it fails.

MTTR—Mean time to recover. Identifies the average (the arithmetic mean) time it takes to restore a

Ah

failed system. Organizations that have maintenance contracts often specify the MTTR as a part of the contract.

multifactor authentication—A type of authentication that uses methods from more than one factor of authentication. Compare with something you know, something you have, and something you are.

et

Multimedia Message Service (MMS)—An extension of SMS. MMS allows users to include multimedia content such as pictures, short videos, audio, or even a slideshow of multiple images.

G

Compare with SMS and Rich Communication Services.

d

N

NAC—Network access control. A system that inspects clients to ensure they are healthy. Healthy

ie

clients are granted access to the network, and unhealthy clients are redirected to a remediation

er tif

network. Agents inspect clients, and agents can be permanent or dissolvable (also known as agentless). MAC filtering is a form of NAC.

NAT—Network Address Translation. A service that translates public IP addresses to private IP addresses and private IP addresses to public IP addresses. National Institute of Standards and Technology (NIST)—NIST is a part of the U.S. Department

C

of Commerce, and it includes an Information Technology Laboratory (ITL). The ITL publishes special publications related to security that are freely available to anyone. They can found at

et

http://csrc.nist.gov/publications/PubsSPs.html. NDA—Non-disclosure agreement. An agreement that is designed to prohibit personnel from sharing

G

proprietary data. It can be used with employees within the organization and with outside organizations. It is commonly embedded as a clause in a contract.

Netcat (nc)—A command-line tool. Netcat is used to connect to remote systems. netstat—A command-line tool. Netstat is used to show network statistics on a system.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

network access control (NAC)—A system that inspects clients to ensure they are healthy. Healthy clients are granted access to the network, and unhealthy clients are redirected to a remediation network. Agents inspect clients, and agents can be permanent or dissolvable (also known as agentless). MAC filtering is a form of NAC.

d

Network Address Translation (NAT)—A service that translates public IP addresses to private IP addresses and private IP addresses to public IP addresses.

ea

network-based intrusion detection system (NIDS)—A device that detects attacks and raises alerts. A NIDS is installed on network devices, such as routers or firewalls and monitors network traffic. It

Ah

can detect network-based attacks.

network-based intrusion prevention system (NIPS)—A device that detects and stops attacks in progress. A NIPS is placed inline (also called in-band) with traffic so that it can actively monitor data streams, detect malicious content, and stop attacks in progress.

et

network interface card (NIC)—Provides connectivity to a network. A NIC is typically built into a circuit board and includes a connector, such as an RJ-45 connector.

G

network scanner—A tool used to discover devices on a network, including their IP addresses, their operating system, along with services and protocols running on the devices. near field communication (NFC)—A group of standards used on mobile devices that allow them to

d

communicate with other nearby mobile devices. Many credit card readers support payments using

ie

NFC technologies with a smartphone.

network interface card (NIC) teaming—A group of two or more network adapters acting as a

er tif

single network adapter. NIC teaming provides increased bandwidth and load balancing capabilities. NFC—Near field communication. A group of standards used on mobile devices that allow them to communicate with other nearby mobile devices. Many credit card readers support payments using NFC technologies with a smartphone.

C

NFC attack—An attack against mobile devices that use near field communication (NFC). NFC is a group of standards that allow mobile devices to communicate with nearby mobile devices. NIC—Network interface card. Provides connectivity to a network. A NIC is typically built into a

et

circuit board and includes a connector, such as an RJ-45 connector.

NIC teaming—Network interface card (NIC) teaming. A group of two or more network adapters

G

acting as a single network adapter. NIC teaming provides increased bandwidth and load balancing capabilities.

NIDS—Network-based intrusion detection system. A device that detects attacks and raises alerts. A NIDS is installed on network devices, such as routers or firewalls and monitors network traffic. It can detect network-based attacks. Copyright 2021 YCDA, LLC v0.1

NIPS—Network-based intrusion prevention system. A device that detects and stops attacks in progress. A NIPS is placed inline (also called in-band) with traffic so that it can actively monitor data streams, detect malicious content, and stop attacks in progress. NIST—National Institute of Standards and Technology. NIST is a part of the U.S. Department of publications related to security that are freely available to anyone. They can found at

ea

http://csrc.nist.gov/publications/PubsSPs.html.

d

Commerce, and it includes an Information Technology Laboratory (ITL). The ITL publishes special

nmap—A command-line tool. Nmap is used to scan networks, and it is a type of network scanner.

Ah

nonce—A number used once. Cryptography elements frequently use a nonce to add randomness. non-disclosure agreement (NDA)—An agreement that is designed to prohibit personnel from sharing proprietary data. It can be used with employees within the organization and with outside organizations. It is commonly embedded as a clause in a contract.

et

non-persistence—A method used in virtual desktops where changes made by a user are not saved. Most (or all) users have the same desktop. When users log off, the desktop reverts to its original state. access logs provide non-repudiation.

G

non-repudiation—The ability to prevent a party from denying an action. Digital signatures and normalization—The process of organizing tables and columns in a database. Normalization reduces

d

redundant data and improves overall database performance.

ie

nslookup—A command-line tool. The nslookup tool is used to test DNS on Microsoft systems. Compare with dig.

er tif

NTLM—New Technology LAN Manager. A suite of protocols that provide confidentiality, integrity, and authentication within Windows systems. Versions include NTLM, NTLMv2, and NTLM2 Session.

NTP—Network Time Protocol. Protocol used to synchronize computer times.

C

Pass the First Time with Quality Practice Test Questions

et

https://gcgapremium.com/sy0-601-practice-test-questions/

G

O

OAuth—An open source standard used for authorization with Internet-based single sign-on solutions. Many companies such as Google, Facebook, PayPal, Microsoft, and Twitter support OAuth. Users can sign on with their account using one of these companies and gain access to other

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

sites. OAuth focuses on authorization, not authentication, and RFC 6749, “The OAuth 2.0 Authorization Framework,” describes it. obfuscation—An attempt to make something unclear or difficult to understand. Steganography methods use obfuscation to hide data within data. Sometimes referred to as camouflage.

d

OCSP—Online Certificate Status Protocol. An alternative to using a CRL. It allows entities to query a CA with the serial number of a certificate. The CA answers with good, revoked, or unknown.

ea

offboarding—The process of removing an individuals access to an organization’s computing

resources leaving the company. It also includes collecting any equipment (such as smartphones,

Ah

tablets, or laptops), security badges, or proximity cards the organization issued to the employee. Compare with onboarding.

offline brute force password attack—A password attack against a database downloaded from a site. An offline attack can repeatedly guess passwords without ever getting locked out. Compare

et

with online brute force password attack.

onboarding—The process of granting individuals access to an organization’s computing resources permissions. Compare with offboarding.

G

after being hired. It typically includes giving the employee a user account with appropriate online brute force password attack—A password attack against an online system. Online systems

d

typically have account lockout capabilities, so online password attacks often use different methods password attack.

ie

(such as a spraying attack) to guess passwords. Compare with spraying attack and offline brute force

er tif

Online Certificate Status Protocol (OCSP)—An alternative to using a CRL. It allows entities to query a CA with the serial number of a certificate. The CA answers with good, revoked, or unknown.

on-path attack—A form of active interception or active eavesdropping. It uses a separate computer

C

that accepts traffic from each party in a conversation and forwards the traffic between the two. An on-path attack is sometimes referred to as a man-in-the-middle or man-in-the-broser attack. open—A wireless mode that doesn’t use security. Compare with Enterprise and PSK modes.

et

OpenID—An authentication standard maintained by the OpenID Foundation. An OpenID provider holds the user’s credentials and websites that support OpenID prompt users to enter their OpenID.

G

OpenID Connect (OIDC)—An open source standard used for identification on the Internet. It

builds on OpenID and uses the OAuth 2.0 framework. OIDC uses a JavaScript Object Notation (JSON) Web Token (JWT), sometimes called an ID token. open-source intelligence (OSINT)—A method of gathering data using public sources, such as

social media sites and news outlets. Copyright 2021 YCDA, LLC v0.1

OpenSSL—An open source software library used with Transport Layer Security (TLS) and the legacy Secure Sockets Layer (SSL) protocols. Many Linux distributions include access to OpenSSL via the command line. operational controls—Controls used to handle the day-to-day operations of an organization.

d

Operational controls help an organization comply with the security policy, and people implement them. Compare with managerial and technical controls.

ea

order of volatility—A term that refers to the order in which you should collect evidence. For example, data in memory is more volatile than data on a disk drive, so it should be collected first.

Ah

OSI—Open Systems Interconnection. The OSI reference model conceptually divides different networking requirements into seven separate layers.

OSINT—A method of gathering data using public sources, such as social media sites and news outlets.

et

out-of-band—A configuration that allows a device to collect traffic without the traffic passing through it. Sometimes called passive. Compare with inline.

G

Pass the First Time with Quality Practice Test Questions https://gcgapremium.com/sy0-601-practice-test-questions/

d

P

ie

P12—PKCS#12. A common format for PKI certificates. They are DER-based (binary) and often

er tif

hold certificates with the private key. They are commonly encrypted. P7B—PKCS#7. A common format for PKI certificates. They are CER-based (ASCII) and commonly used to share public keys.

PaaS—Platform as a Service. A cloud computing model. PaaS provides cloud customers with a preconfigured computing platform they can use as needed. PaaS is a fully managed platform,

C

meaning that the vendor keeps the platform up to date with current patches. Compare with IaaS, SaaS and XaaS.

et

PAM—Privileged access management. A method of protecting access to privileged accounts. PAM

implements the concept of just-in-time administration, giving users elevated privileges only when

G

they need them and only for a limited time. PAM is sometimes called privileged account management. PAP—Password Authentication Protocol. An older authentication protocol where passwords or PINs are sent across the network in cleartext. Compare with CHAP and MS-CHAPv2.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

partially known environment test—A type of penetration test. Testers have some knowledge of the environment prior to starting the test. This was previously known as a gray box test. Compare with known environment test and unknown environment test. passive reconnaissance—A penetration testing method used to collect information. It typically uses

d

open-source intelligence. Compare with active reconnaissance. pass the hash—A password attack that captures and uses the hash of a password. It attempts to log

ea

on as the user with the hash and is commonly associated with the Microsoft NTLM protocol. password cracker—A tool used to discover passwords. includes evaluating and testing patches before deploying them.

Ah

patch management—The process used to keep systems up to date with current patches. It typically PBKDF2—Password-Based Key Derivation Function 2. A key stretching algorithm technique that adds additional bits to a password as a salt. It helps prevent brute force and rainbow table attacks.

et

Compare with Bcrypt and Argon2.

PDF—Portable Document Format. Type of file for documents. Attackers have embedded malware

G

in PDFs.

PEAP—Protected Extensible Authentication Protocol. An extension of EAP sometimes used with 802.1X. PEAP provides an extra layer of protection for EAP and it is sometimes used with 802.1X.

ie

EAP-FAST.

d

PEAP requires a certificate on the 802.1X server. Compare with EAP, EAP-TLS, EAP-TTLS, and PEM—Privacy Enhanced Mail. A common format for PKI certificates. It can use either CER

er tif

(ASCII) or DER (binary) formats and can be used for almost any type of certificates. penetration testing—A method of testing targeted systems to determine if vulnerabilities can be exploited. Penetration tests are intrusive.

perfect forward secrecy—A characteristic of encryption keys ensuring that keys are random.

C

Perfect forward secrecy methods generate random public keys for each session, and do not use deterministic algorithms. permanent agent—A NAC agent that is installed on a client. It checks the client for health.

et

Compare with agentless or dissolvable agent. Personal Identity Verification card (PIV)—A specialized type of smart card used by U.S. federal

G

agencies. It includes photo identification and provides confidentiality, integrity, authentication, and non-repudiation for the users. Compare with CAC. Personally Identifiable Information (PII)—Information about individuals that can be used to trace

a person’s identity, such as a full name, birth date, biometric data, and identifying numbers such as a

Copyright 2021 YCDA, LLC v0.1

Social Security number (SSN). Organizations have an obligation to protect PII and often identify procedures for handling and retaining PII in data policies such as encrypting it. PFX—Personal Information Exchange. A common format for PKI certificates. It is the predecessor to P12 certificates.

d

pharming—A type of DNS poisoning attack. Pharming attacks redirect a website’s traffic to another PHI—Personal Health Information. PII that includes health information.

ea

website.

phishing—The practice of sending spam to users with the purpose of tricking them into revealing links.

Ah

personal information or clicking on a link. Phishing often includes malicious attachments or malicious physical controls—Security controls that you can physically touch. Compare with preventive, detective, corrective, deterrent, and, compensating controls.

et

PII—Personally Identifiable Information. Information about individuals that can be used to trace a person’s identity, such as a full name, birth date, biometric data, and identifying numbers such as a

G

Social Security number (SSN). Organizations have an obligation to protect PII and often identify procedures for handling and retaining PII in data policies such as encrypting it. PIN—Personal identification number. A number known by a user and entered for authentication.

d

PINs are often combined with smart cards to provide dual-factor authentication.

ie

ping—A command-line tool. Ping is used to test connectivity with remote systems. pinning—A security mechanism used by some websites to prevent website impersonation. Websites website.

er tif

provide clients with a list of public key hashes. Clients store the list and use it to validate the PIV—Personal Identity Verification card. A specialized type of smart card used by U.S. federal agencies. It includes photo identification and provides confidentiality, integrity, authentication, and

C

non-repudiation for the users. Compare with CAC. pivoting—Process of using various tools to gain additional information on a system or network. After escalating privileges, a penetration tester (or attacker) uses the exploited computer to gain

et

additional information on other systems within the network. PKI—Public Key Infrastructure. Group of technologies used to request, create, manage, store,

G

distribute, and revoke digital certificates. Certificates include public keys along with details on the owner of the certificate, and on the CA that issued the certificate. Certificate owners share their public key by sharing a copy of their certificate. A PKI requires a trust model between CAs and most trust models are hierarchical and centralized with a central root CA.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

plaintext—Text displayed in a readable format. Encryption converts plaintext to ciphertext, and plaintext is unencrypted. Compare with ciphertext. Platform as a Service (PaaS)—A cloud computing model. PaaS provides cloud customers with a preconfigured computing platform they can use as needed. PaaS is a fully managed platform,

d

meaning that the vendor keeps the platform up to date with current patches. Compare with IaaS, SaaS and XaaS.

ea

playbooks—Used with SOAR. A automated response to a potential checklist. Playbooks are derived from runbooks. Compare with SOAR and runbooks.

Ah

pointer dereference—A programming practice that uses a pointer to reference a memory area. A failed dereference operation can corrupt memory and sometimes even cause an application to crash.

POP3—Post Office Protocol v3. Used to transfer email from mail servers to clients. POP3 uses TCP port 110 for unencrypted connections and TCP port 995 for encrypted connections

et

port mirror—A monitoring port on a switch. All traffic going through the switch is also sent to the port mirror.

G

port taps—Monitoring ports on a network device. IDSs use taps to capture traffic. post-quantum cryptography—Cryptographic algorithms that are likely to be resistant to attacks from attackers using a quantum computer. NIST is expected to release a draft of selected standards

d

by 2024.

ie

posturing—A method of verifying a device complies with security policies. Some mobile device management (MDM) systems use device posturing to check the status of a device, such as the

er tif

operating system version and whether the screen lock is enabled or not. potentially unwanted programs (PUPs)—Software installed on users’ systems without their awareness or consent. Some of these unwanted programs are legitimate, but some are malicious, such as Trojans. Compare with spyware.

C

preshared key (PSK)—A secret shared among different systems. Wireless networks using WPA2 support Personal mode, where each device uses the same PSK. WPA3 uses a Simultaneous Authentication of Equals (SAE) instead of a PSK. Compare with Enterprise and Open modes.

et

preventive controls—Security controls that attempt to prevent a security incident from occurring. Compare with detective, corrective, deterrent, compensating, and physical security controls.

G

private data—Information about an individual that should remain private. Personally Identifiable

Information (PII) and Personal Health Information (PHI) are two examples. private key—Part of a matched key pair used in asymmetric encryption. The private key always

stays private. Compare with public key. privileged account—An account with elevated privileges, such as an administrator account. Copyright 2021 YCDA, LLC v0.1

privileged access management (PAM)—A method of protecting access to privileged accounts. PAM implements the concept of just-in-time administration, giving users elevated privileges only when they need them and only for a limited time. PAM is sometimes called privileged account management.

d

privilege escalation—The process of gaining elevated rights and permissions. Attackers and malware typically uses a variety of techniques to gain elevated privileges.

ea

proprietary data—Data that is related to ownership. Common examples are information related to patents or trade secrets.

Ah

Protected Extensible Authentication Protocol (PEAP)—An extension of EAP sometimes used with 802.1X. PEAP provides an extra layer of protection for EAP and it is sometimes used with 802.1X. PEAP requires a certificate on the 802.1X server. Compare with EAP, EAP-TLS, EAPTTLS, and EAP-FAST.

et

protocol analyzer—A tool used to capture network traffic. Both professionals and attackers use text.

G

protocol analyzers to examine packets. A protocol analyzer can be used to view data sent in clear proximity card readers—Devices that sense when proximity cards are close. They are often used by authorized personnel to open doors.

d

proximity cards—Small credit card-sized cards that activate when they are in close proximity to a

ie

proximity card reader. They are often used by authorized personnel to open doors. proxy server— A server used to forward requests for services such as HTTP or HTTPS. All internal

er tif

clients send their outgoing requests to the proxy server, and the proxy server sends the requests to the Internet server. Proxy servers increase performance by caching web pages and can filter URLs. A proxy server is commonly called a forward proxy server. Compare with reverse proxy server. pseudo-anonymization—The process of replacing PII data with pseudonyms. The data set appears

C

anonymous, but the owner of the data maintains a database that matches the pseudonyms back to the original data. Compare with anonymization, data masking, and tokenization. PSK—Preshared key. A secret shared among different systems. Wireless networks using WPA2

et

support Personal mode, where each device uses the same PSK. WPA3 uses a Simultaneous Authentication of Equals (SAE) instead of a PSK. Compare with Enterprise and Open modes.

G

public data—Data that is available to anyone. It might be in brochures, in press releases, or on

websites. public key—Part of a matched key pair used in asymmetric encryption. The public key is publicly

available. Compare with private key.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

public ledgers—A record of transactions such as deposits and withdrawals. Blockchain uses public ledgers used to track transactions while keeping the transactions anonymous. Some ransomware transactions can be viewed by viewing the public ledgers, but the transactions are still anonymous. Compare with blockchain.

d

Public Key Infrastructure (PKI)—Group of technologies used to request, create, manage, store, distribute, and revoke digital certificates. Certificates include public keys along with details on the

ea

owner of the certificate, and on the CA that issued the certificate. Certificate owners share their

public key by sharing a copy of their certificate. A PKI requires a trust model between CAs and most

Ah

trust models are hierarchical and centralized with a central root CA.

pulping—A data sanitization process. Pulping is performed after shredding papers, and it reduces the shredded paper to a mash or puree. Compare with burning, shredding, pulverizing, and degaussing.

et

PUPs—Potentially unwanted programs. Software installed on users’ systems without their such as Trojans. Compare with spyware.

G

awareness or consent. Some of these unwanted programs are legitimate, but some are malicious, pulverizing— A data sanitization process. A process used to physically destroy items such as optical degaussing.

d

discs that can’t be erased by a degausser. Compare with burning, shredding, pulping, and

ie

purging—A data sanitization process. A general sanitization term indicating that all sensitive data has been removed from a device. Compare with burning, shredding, pulping, pulverizing, and

er tif

degaussing.

purple team—Personnel involved in cybersecurity readiness that can join either a red team or a blue team. Compare with red team, blue team, white team and capture the flag. push notification services—The services that send messages to mobile devices. Many mobile

et

Q

C

device applications push notification messages to users.

qualitative risk assessment—A risk assessment that uses judgment to categorize risks. It is based

G

on impact and likelihood of occurrence. quantitative risk assessment—A risk assessment that uses specific monetary amounts to identify

cost and asset value. It then uses the SLE and ARO to calculate the ALE. quantum computing—Cryptography that uses quantum mechanical properties to perform

cryptographic tasks. Copyright 2021 YCDA, LLC v0.1

quantum cryptography—An example of quantum computing. It uses quantum computing standards to create a cryptographic key.

R

d

RA—Recovery agent. A designated individual who can recover or restore cryptographic keys. In the

ea

context of a PKI, a recovery agent can recover private keys to access encrypted data, or in some

situations, recover the data without recovering the private key. In some cases, recovery agents can recover the private key from a key escrow.

Ah

RADIUS—Remote Authentication Dial-In User Service. Provides central authentication for remote access clients. RADIUS uses symmetric encryption to encrypt the password packets, and it uses UDP by default. In contrast, TACACS+ encrypts the entire authentication process and uses TCP. RFC 3579 “RADIUS Support for EAP” supports encryption of the entire authentication process

et

using TCP. Compare with TACACS+.

race condition—A programming flaw that occurs when two sets of code attempt to access the same

G

resource. The first one to access the resource wins, which can result in inconsistent results. RAID—Redundant array of inexpensive disks. Multiple disks added together to increase

d

performance or provide protection against faults. RAID helps prevent disk subsystems from being a single point of failure. Compare with RAID-0, RAID-1, RAID-5, RAID-6, and RAID-10.

ie

RAID-0—Disk striping. RAID-0 improves performance but does not provide fault tolerance.

er tif

RAID-1—Disk mirroring. RAID-1 uses two disks and provides fault tolerance. RAID-5—Disk striping with parity. RAID-5 uses three or more disks and provides fault tolerance. It can survive the failure of a single drive.

RAID-6—Disk striping with parity. RAID-6 uses four or more disks and provides fault tolerance. It can survive the failure of two drives.

C

RAID-10—Disk mirroring with striping. RAID-10 combines the features of mirroring (RAID-1) and striping (RAID-0). The minimum number of drives in a RAID-10 is four, and a RAID-10 always has

et

an even number of drives.

rainbow table—A file containing precomputed hashes for character combinations. Rainbow tables

G

are used to discover passwords. PBKDF2, Bcrypt, and Argon2 thwart rainbow table attacks.

RAM—Random access memory. Volatile memory within a computer that holds active processes,

data, and applications. Data in RAM is lost when the computer is turned off. Memory forensics analyzes data in RAM.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

ransomware—A type of malware used to extort money from individuals and organizations. Ransomware typically encrypts the user’s data and demands a ransom before decrypting the data. Rapid Spanning Tree Protocol (RSTP)—An improvement over STP. STP and RSTP protocols are enabled on most switches and protect against switching loops, such as those caused when two ports

d

of a switch are connected together. RAS—Remote Access Service. Provides access to an internal network from an outside source

ea

location using dial-up or a VPN.

RAT—Remote access Trojan. Malware that allows an attacker to take control of a system from a

Ah

remote location. A RAT gives an attacker full control over a user’s system from a remote location over the Internet.

RDP—Remote Desktop Protocol. Used to connect to remote systems. Microsoft uses RDP in TCP 3389 or UDP 3389.

et

different services such as Remote Desktop Services and Remote Assistance. RDP uses either port real-time operating system (RTOS)—An operating system that reacts to input within a specific

G

time. Many embedded systems include an RTOS.

reconnaissance—A penetration phase where testers gather information on a target. Compare with active reconnaissance and passive reconnaissance.

d

recovery agent (RA)—A designated individual who can recover or restore cryptographic keys. In

ie

the context of a PKI, a recovery agent can recover private keys to access encrypted data, or in some situations, recover the data without recovering the private key. In some cases, recovery agents can

er tif

recover the private key from a key escrow.

recovery point objective (RPO)—A term that refers to the amount of data you can afford to lose by identifying a point in time where data loss is acceptable. It is often identified in a BIA. Compare with RTO.

C

recovery site—An alternate location for business functions after a major disaster. Compare with cold site, warm site, and hot site. recovery time objective (RTO)—The maximum amount of time it should take to restore a system

et

after an outage. It is derived from the maximum allowable outage time identified in the BIA. Compare with RPO.

G

red team—Personnel involved in cybersecurity readiness that are experts in attacking systems. Red team members emulate the techniques used by potential attackers. Compare with blue team, purple team, white team, and capture the flag.

redundancy—The process of adding duplication to critical system components and networks. Redunancy and fault-tolerance methods increase increase availability supporting resiliency. Copyright 2021 YCDA, LLC v0.1

redundant array of inexpensive disks (RAID)—Multiple disks added together to increase performance or provide protection against faults. RAID helps prevent disk subsystems from being a single point of failure. Compare with RAID-0, RAID-1, RAID-5, RAID-6, and RAID-10. refactoring—A driver manipulation method. Developers rewrite the code without changing the

d

driver’s behavior. registration authority (RA)—An entity that can collect registration information for a certificate

ea

authority (CA). An RA never issues certificates, but instead only assists the CA. All CAs don’t use an RA. Compare with certificate authority.

Ah

remote access Trojan (RAT)—Malware that allows an attacker to take control of a system from a remote location. A RAT gives an attacker full control over a user’s system from a remote location over the Internet.

Remote Authentication Dial-In User Service (RADIUS)—Provides central authentication for

et

remote access clients. RADIUS uses symmetric encryption to encrypt the password packets, and it uses UDP by default. In contrast, TACACS+ encrypts the entire authentication process and uses

G

TCP. RFC 3579 “RADIUS Support for EAP” supports encryption of the entire authentication process using TCP. Compare with TACACS+.

Remote Desktop Protocol (RDP)—Used to connect to remote systems. Microsoft uses RDP in

ie

TCP 3389 or UDP 3389.

d

different services such as Remote Desktop Services and Remote Assistance. RDP uses either port remote wipe—The process of sending a signal to a remote device to erase all data. It is useful when a

er tif

mobile device is lost or stolen.

replay attack—An attack where the data is captured and replayed. Attackers typically modify data before replaying it.

resilience—A system’s ability to continue to operate even after an adverse event. Resilience is

C

similar to availability. However, availability tries to keep systems operational 100 percent of the time, which isn’t possible. In contrast, resilience expects systems to have outages and seeks to restore the system to full operation as soon as possible after the outage. Compare with availability.

et

resource exhaustion—The malicious result of many DoS and DDoS attacks. The attack overloads a

computer’s resources (such as the processor and memory), resulting in service interruption.

G

retina scanners—A biometric authentication system. Retina scanners scan the retina of an eye for authentication. Some people object to using these scanners for authentication because they can identify medical issues and because you typically need to have physical contact with the scanner.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

reverse proxy server—A server used to accept requests from the Internet and forward them to a Web server. It appears to clients as a web server but is forwarding the requests to the web server and serving the pages returned by the web server. Compare with forward proxy server. RFI—Radio frequency interference. Interference from RF sources such as AM or FM transmitters.

d

RFI can be filtered to prevent data interference, and cables can be shielded to protect signals from RFI.

ea

RFID—Radio frequency identification. RFID methods are often used for inventory control.

RFID attacks—Attacks against radio-frequency identification (RFID) systems. Some common

Ah

RFID attacks are eavesdropping, replay, and DoS.

Rich Communication Services (RCS)— An extension of SMS and MMS. RCS supports all of the features of MMS and adds a few additional features. If a system doesn’t support RCS, it can default to SMS or MMS. Compare with SMS and Multimedia Message Service.

et

risk—The possibility or likelihood of a threat exploiting a vulnerability resulting in a loss. Compare with threat and vulnerability.

G

risk assessment—A process used to identify and prioritize risks. It includes quantitative risk assessments and qualitative risk assessments. Compare with quantitative assessment and qualitative assessment.

d

risk management—The practice of identifying, monitoring, and limiting risks to a manageable assessments.

ie

level. It includes risk response techniques, qualitative risk assessments, and quantitative risk

er tif

Risk Management Framework (RMF)—A framework for identifying and managing risk. NIST published it as SP 800-37, “Risk Management Framework for Information Systems and Organizations.” It includes seven steps: prepare, categorizing information systems, select security controls, assess security controls, authorize information systems, monitor security controls.

C

risk matrix—A graph that plots risks onto a graph or chart. A risk matrix typically plots the likelihood of occurrence against the impact of a risk. Compare with heat map. risk mitigation—The process of reducing risk by implementing security controls. Security controls

et

reduce risk by reducing vulnerabilities associated with a risk or by reducing the impact of a threat.

risk register—A document listing information about known risks. It typically includes risk scores

G

along with recommended security controls to reduce the risk scores.

risk response techniques—Methods used to manage risks. Common risk response techniques are

accept, avoid, mitigate, transfer, and cybersecurity insurance. RMF—Risk Management Framework. A framework for identifying and managing risk. NIST published it as SP 800-37, “Risk Management Framework for Information Systems and Copyright 2021 YCDA, LLC v0.1

Organizations.” It includes seven steps: prepare, categorizing information systems, select security controls, assess security controls, authorize information systems, monitor security controls. rogue AP—An unauthorized AP. It can be placed by an attacker or an employee who hasn’t obtained permission to do so. An evil twin is a special type of rogue AP with the same or similar SSIS as a

d

legitimate AP. ROI—Return of investment or return on investment. A performance measure used to identify when

ea

an investment provides a positive benefit to the investor. It is sometimes considered when evaluating the purchase of new security controls.

Ah

role-based access control—An access control scheme. Role-based access control uses roles based on jobs and functions to define access. It is often implemented with groups (providing group-based privileges) and uses a matrix as a planning document to match roles with the required privileges. Compare with ABAC, DAC, MAC, and rule-based access control.

et

root certificate—A PKI certificate identifying a root CA. access. Compare with jailbreaking.

G

rooting—The process of modifying an Android device, giving the user root-level, or administrator, rootkit—A type of malware that has system-level access to a computer. Rootkits are often able to hide themselves from users and antivirus software.

d

ROT13—A substitution cipher that uses a key of 13. To encrypt a message, you would rotate each

ie

letter 13 spaces. To decrypt a message, you would rotate each letter 13 spaces. router—A network device that connects multiple network segments together into a single network. ACLs.

er tif

They route traffic based on the destination IP address and do not pass broadcast traffic. Routers use RPO—Recovery point objective. A term that refers to the amount of data you can afford to lose by identifying a point in time where data loss is acceptable. It is often identified in a BIA. Compare

C

with RTO.

RSA—Rivest, Shamir, and Adleman. An asymmetric algorithm used to encrypt data and digitally sign transmissions. It is named after its creators, Rivest, Shamir, and Adleman. RSA uses both a

et

public key and a private key in a matched pair.

RSTP—Rapid Spanning Tree Protocol. An improvement over STP. STP and RSTP protocols are

G

enabled on most switches and protect against switching loops, such as those caused when two ports of a switch are connected together. RTO—Recovery time objective. The maximum amount of time it should take to restore a system

after an outage. It is derived from the maximum allowable outage time identified in the BIA. Compare with RPO.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

RTOS—Real-time operating system. An operating system that reacts to input within a specific time. Many embedded systems include an RTOS. rule-based access control—An access control scheme. Rule-based access control is based on a set of approved instructions, such as an access control list, or rules that trigger in response to an event

d

such as modifying ACLs after detecting an attack. Compare with ABAC, DAC, MAC, and role-based access control.

ea

runbooks—Used with SOAR. A checklist of things to check in response to a suspected incident. Runbooks are used when creating playbooks. Compare with SOAR and playbooks.

Ah

S

SaaS—Software as a Service. A cloud computing model. SaaS provides applications over the up-to-date. Compare with IaaS, PaaS and XaaS.

et

Internet, such as webmail. The vendor is responsible for keeping the SaaS applications available and salt—A random set of data added to a password when creating the hash. PBKDF2, Bcrypt, and

G

Argon2 are some protocols that use salts. These help thwart rainbow table attacks. salting—The process of adding a random set of data to a password when creating the hash. PBKDF2,

d

Bcrypt, and Argon2 are three protocols that use salts.

SAML—Security Assertions Markup Language. An XML-based standard used to exchange

er tif

web-based applications.

ie

authentication and authorization information between different parties. SAML provides SSO for SAN—Storage Area Network. A specialized network of high-speed storage devices. sandboxing—The use of an isolated area on a system, typically for testing. Virtual machines are often used to test patches in an isolated sandbox. Application developers sometimes use sandboxes to create isolated systems for testing. Antivirus software uses sandboxes to check suspicious

C

software before allowing it to run on a system. sanitize—The process of destroying or removing all sensitive data from systems and devices. Data

et

sanitization methods include burning, shredding, pulping, pulverizing, degaussing, purging, and wiping.

G

SCADA—Supervisory control and data acquisition. A system used to control an ICS such as a power plant or water treatment facility. Ideally, a SCADA is within an isolated network without direct access to the Internet. NIPS systems and VLANs provide a layer of protection for SCADA systems. Compare with ICS. scalability—A system's ability to handle increased workload either by scaling up or by scaling out. Copyright 2021 YCDA, LLC v0.1

Scaling up adds additional resources (such as more RAM) to a server, and scaling out adds additional servers. Compare with elasticity. SCP—Secure Copy. Based on SSH, SCP allows users to copy encrypted files over a network. SCP uses TCP port 22.

d

screened subnet—A buffer zone between the Internet and an internal network. It allows access to services while segmenting access to the internal network. Internet clients can access the services

ea

hosted on servers in the screened subnet, but the screened subnet provides a layer of protection for the internal network. A screened subnet was previously known as a demilitarized zone (DMZ).

Ah

Compare with DMZ.

screen filter—A physical security device used to reduce visibility of a computer screen. Screen filters help prevent shoulder surfing.

script kiddie—An attacker with little expertise or sophistication. Script kiddies use existing scripts

et

to launch attacks.

SDN—Software defined network. A method of using software and virtualization technologies to

G

replace hardware routers. SDNs separate the data and control planes.

SDV—Software-defined visibility. Technologies used to view all network traffic. SDV technologies ensure that all cloud-based traffic is viewable and can be analyzed.

d

Secure Hash Algorithm (SHA)—A hashing function used to provide integrity. Versions include

ie

SHA-1, SHA-2, and SHA-3. SHA-1 is no longer approved for most cryptographic uses due to weaknesses. SHA-2 has four versions (Sha-256, SHA-512, SHA-224, and SHA-384). SHA-3

er tif

(previously known as Keccak) was selected as the next version after a public competition. Secure/Multipurpose Internet Mail Extensions (S/MIME)—Used to secure email. S/MIME provides confidentiality, integrity, authentication, and non-repudiation. It can digitally sign and encrypt email, including the encryption of email at rest and in transit. It uses RSA, with public and

C

private keys for encryption and decryption, and depends on a PKI for certificates. Secure Orchestration, Automation, and Response (SOAR)—Tools used to automatically respond to low-level security events. Runbooks are the checklists used to create the automated responses and

et

playbooks are the automated actions created from the runbooks. Compare with playbooks and runbooks.

G

Secure Real-time Transport Protocol (SRTP)—A protocol used to encrypt and provide

authentication for Real-time Transport Protocol (RTP) traffic. RTP is used for audio/video streaming.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

Secure Shell (SSH)—A protocol used to encrypt network traffic. SSH encrypts a wide variety of traffic such as SCP, SFTP, Telnet, and TCP Wrappers. SSH uses TCP port 22. SSH is a more secure alternative than Telnet when connecting to remote servers. Secure Sockets Layer (SSL)—The predecessor to TLS. SSL is used to encrypt data in transit with

d

the use of certificates. Security Assertions Markup Language (SAML)—An XML-based standard used to exchange

ea

authentication and authorization information between different parties. SAML provides SSO for web-based applications.

Ah

security incident—An adverse event or series of events that can negatively affect the

confidentiality, integrity, or availability of an organization’s information technology (IT) systems and data. Sometimes referred to as an incident.

Security information and event management (SIEM)—A system that provides a centralized logs to the SIEM system, and it aggregates the logs.

et

solution for collecting, analyzing, and managing log data from multiple sources. Log collectors send

G

SED—Self-encrypting drive. A drive that includes the hardware and software necessary to encrypt a hard drive. SEDs include all the encryption circuitry built into the drive, and they automatically encrypt the drive without user action. Users typically enter credentials to decrypt and use the drive.

d

Compare with FDE.

ie

self-encrypting drive (SED)—A drive that includes the hardware and software necessary to encrypt a hard drive. SEDs include all the encryption circuitry built into the drive, and they automatically

er tif

encrypt the drive without user action. Users typically enter credentials to decrypt and use the drive. Compare with FDE.

SELinux—Security-Enhanced Linux. An operating system platform that prevents malicious or suspicious code from executing on both Linux and Unix systems. It is one of the few operating

C

systems that use the MAC model. Enforcing mode will enforce the SELinux policy and ignore permissions. Permissive mode does not enforce the SELinux policy but instead logs any access that would normally be blocked. Disabled mode does not enforce the SELinux policy and does not log

et

anything related to the policy. separation of duties—A security principle. The separation of duties principle prevents any single

G

person or entity from controlling all the functions of a critical or sensitive process. It’s designed to prevent fraud, theft, and errors.

service account—An account used by a service or application. service level agreement (SLA)—An agreement between a company and a vendor that stipulates performance expectations, such as minimum uptime and maximum downtime levels. Organizations Copyright 2021 YCDA, LLC v0.1

use SLAs when contracting services from service providers such as Internet Service Providers (ISPs). session hijacking—An attack that attempts to impersonate a user by capturing and using a session ID. Session IDs are stored in cookies.

d

Service Set Identifier (SSID)—The name of a wireless network. SSIDs can be set to broadcast so users can easily see the SSID. Disabling SSID broadcast hides it from casual users, but an attacker can discover it

ea

with a wireless sniffer. It’s recommended to change the SSID from the default name.

SFTP—SSH File Transfer Protocol. An extension of Secure Shell (SSH) used to encrypt FTP

Ah

traffic. SFTP transmits data using TCP port 22. SFTP is sometimes referred to as secure FTP.

SHA—Secure Hash Algorithm. A hashing function used to provide integrity. Versions include SHA-1, SHA-2, and SHA-3. SHA-1 is no longer approved for most cryptographic uses due to weaknesses. SHA-2 has four versions (Sha-256, SHA-512, SHA-224, and SHA-384). SHA-3

et

(previously known as Keccak) was selected as the next version after a public competition. shadow IT—Unauthorized systems or applications installed on a network. Users sometimes install

G

systems without approval, often to bypass security controls. Shadow IT increases risks because these systems aren’t managed.

shimming—A driver manipulation method. It uses additional code to modify the behavior of a driver.

d

Simple Network Management Protocol, version 3 (SNMPv3)—Used to manage and monitor

ie

network devices such as routers or switches. SNMP agents report information via notifications known as SNMP traps or SNMP device traps. SNMP uses UDP ports 161 and 162.

er tif

single loss expectancy (SLE)—The monetary value of any single loss. It is used to measure risk with ALE and ARO in a quantitative risk assessment. The calculation is SLE × ARO = ALE. Compare with ALE and ARO.

shoulder surfing—The practice of looking over someone’s shoulder to obtain information, such as

C

on a computer screen. A screen filter placed over a monitor helps reduce the success of shoulder surfing.

shredding—A method of destroying data or sanitizing media. Cross-cut paper shredders cut papers

et

into fine particles. File shredders remove all remnants of a file by overwriting the contents multiple times.

G

sideloading—The process of copying an application package to a mobile device. It is useful for

developers when testing apps, but can be risky if users sideload unauthorized apps to their device. SIEM—Security information and event management. A system that provides a centralized solution

for collecting, analyzing, and managing log data from multiple sources. Log collectors send logs to the SIEM system, and it aggregates the logs.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

signature-based—A type of monitoring used on intrusion detection and intrusion prevention systems. It detects attacks based on known attack patterns documented as attack signatures. SIM—Subscriber Identity Module. A small card that contains programming and information for small devices such as cell phones. The SIM card identifies what countries or networks the device

d

will use. simulation exercise—Functional exercises that allow personnel to test plans in a simulated

ea

operational environment. Personnel go through the actual steps of an exercise but in a simulated environment.

Ah

single point of failure (SPOF)—Any component whose failure results in the failure of an entire

system. Elements such as RAID, failover clustering, UPS, and generators remove many single points of failure.

single sign-on (SSO)—Authentication method where users can access multiple resources on a

et

network using a single account. SSO can provide central authentication against a federated database for different operating systems.

G

SLA—Service level agreement. An agreement between a company and a vendor that stipulates performance expectations, such as minimum uptime and maximum downtime levels. Organizations use SLAs when contracting services from service providers such as Internet Service Providers

d

(ISPs).

ie

SLE—Single loss expectancy. The monetary value of any single loss. It is used to measure risk with ALE and ARO in a quantitative risk assessment. The calculation is SLE × ARO = ALE. Compare

er tif

with ALE and ARO.

smart card—A credit card-sized card that has an embedded microchip and a certificate. It is used for authentication in the something you have factor of authentication. S/MIME—Secure/Multipurpose Internet Mail Extensions. Used to secure email. S/MIME provides

C

confidentiality, integrity, authentication, and non-repudiation. It can digitally sign and encrypt email, including the encryption of email at rest and in transit. It uses RSA, with public and private keys for encryption and decryption, and depends on a PKI for certificates.

et

smishing—A mashup of SMS and phishing. The practice of sending spam to users via text. SMS—Short Message Service. A basic text messaging service. Most mobile devices support SMS.

G

Compare with Multimedia Message Service and Rich Communication Services. SMTP—Simple Mail Transfer Protocol. Used to transfer email between clients and servers and

between email servers and other email servers. SMTP uses TCP port 25.

Copyright 2021 YCDA, LLC v0.1

snapshot—A copy of a virtual machine (VM) at a moment in time. If you later have problems with the VM, you can revert it to the state it was in when you took the snapshot. Some backup programs also use snapshots to create a copy of data at a moment in time. SNMPv3—Simple Network Management Protocol. Used to manage and monitor network devices

d

such as routers or switches. SNMP agents report information via notifications known as SNMP traps or SNMP device traps. SNMP uses UDP ports 161 and 162.

ea

SOAR—Secure Orchestration, Automation, and Response. Tools used to automatically respond to low-level security events. Runbooks are the checklists used to create the automated responses and

Ah

playbooks are the automated actions created from the runbooks. Compare with playbooks and runbooks.

SoC—System on chip. An integrated circuit that includes a computing system within the hardware. Many mobile devices include an SoC.

et

social engineering—The practice of using social tactics to gain information. Social engineers attempt to gain information from people, or get people to do things they wouldn’t normally do.

G

Software as a Service (SaaS)—A cloud computing model. SaaS provides applications over the Internet, such as webmail. The vendor is responsible for keeping the SaaS applications available and up-to-date. Compare with IaaS, PaaS, and XaaS.

d

software defined network (SDN)—A method of using software and virtualization technologies to

ie

replace hardware routers. SDNs separate the data and control planes. software-defined visibility (SDV) —Technologies used to view all network traffic. SDV technologies

er tif

ensure that all cloud-based traffic is viewable and can be analyzed. solid state drive (SSD)—A drive used in place of a traditional hard drive. An SSD has no moving parts but instead stores the contents as nonvolatile memory. SSDs are much quicker than traditional hard drives.

C

someone you know— An authentication attribute. The someone you know attribute indicates that someone is vouching for you. Compare with somewhere you are, something you can do, something you exhibit, and authentication factors.

et

something you are—An authentication factor. The something you are factor of authentication uses

biometrics, such as a fingerprint scanner. Compare with something you know and something you

G

have.

something you can do— An authentication attribute. The something you can do attribute indicates action, such as gestures on a touch screen. Compare with somewhere you are, something you exhibit,

someone you know, and authentication factors.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

something you exhibit— An authentication attribute. The something you exhibit attribute indicates something someone wears, such as an identification badge. Compare with somewhere you are, something you can do, someone you know, and authentication factors. something you have—An authentication factor. The something you have factor of authentication

d

refers to something a user possesses, such as a smart card. Compare with something you know and something you are.

ea

something you know—An authentication factor. The something you know factor of authentication

refers to something a user knows, such as a password or PIN. Compare with something you have and

Ah

something you are.

somewhere you are—An authentication attribute. The somewhere you are attribute identifies a user’s location using geolocation technologies. Compare with something you can do, something you exhibit, someone you know, and authentication factors.

et

spam—Unwanted or unsolicited email. Attackers often launch attacks using spam. spam filter—A method of blocking unwanted email. By blocking email, it often blocks malware.

G

spam over Internet messaging (SPIM)—A form of spam using instant messaging. SPIM targets instant messaging users.

Spanning Tree Protocol (STP)—Protocol enabled on most switches that protects against switching

d

loops. A switching loop is caused when two ports of a switch are connected together.

ie

spear phishing—A targeted form of phishing. Spear phishing attacks attempt to target specific groups of users, such as those within a specific organization or even a single user.

er tif

SPIM—Spam over Internet Messaging. A form of spam using instant messaging. SPIM targets instant messaging users.

split tunnel—An encrypted connection used with VPNs. A split tunnel only encrypts traffic going to private IP addresses used in the private network. Compare with full tunnel.

C

SPOF—Single point of failure. Any component whose failure results in the failure of an entire system. Elements such as RAID, failover clustering, UPS, and generators remove many single points of failure.

et

spraying attack—A password attack that loops through a list of targeted user accounts. It picks a

password and then tries it against each of the accounts in the list. These targeted user accounts can be

G

on multiple systems. Once it gets through the list, it picks another password and loops through the list again. This bypasses account lockout policies because it takes a long time before it guesses a password for the same account again.

Copyright 2021 YCDA, LLC v0.1

spyware—Software installed on users’ systems without their awareness or consent. Its purpose is often to monitor the user’s computer and the user’s activity. Compare with potentially unwanted programs. SQL—Structured Query Language. Used by SQL-based databases, such as Microsoft SQL Server.

d

Websites integrated with a SQL database are subject to SQL injection attacks. Input validation with forms and stored procedures help prevent SQL injection attacks. Microsoft SQL Server uses TCP

ea

port 1433 by default.

SRTP—Secure Real-time Transport Protocol. A protocol used to encrypt and provide authentication

Ah

for Real-time Transport Protocol (RTP) traffic. RTP is used for audio/video streaming.

SSD—Solid state drive. A drive used in place of a traditional hard drive. An SSD has no moving parts but instead stores the contents as nonvolatile memory. SSDs are much quicker than traditional hard drives.

et

SSH—Secure Shell. A protocol used to encrypt network traffic. SSH encrypts a wide variety of traffic such as SCP, SFTP, Telnet, and TCP Wrappers. SSH uses TCP port 22. SSH is a more secure

G

alternative than Telnet when connecting to remote servers.

SSH File Transfer Protocol (SFTP)—An extension of Secure Shell (SSH) used to encrypt FTP traffic. SFTP transmits data using TCP port 22. SFTP is sometimes referred to as secure FTP.

d

SSID—Service Set Identifier. The name of a wireless network. SSIDs can be set to broadcast so users

ie

can easily see the SSID. Disabling SSID broadcast hides it from casual users, but an attacker can discover it

with a wireless sniffer. It’s recommended to change the SSID from the default name.

er tif

SSO—Single sign-on. Authentication method where users can access multiple resources on a network using a single account. SSO can provide central authentication against a federated database for different operating systems.

stapling—The process of appending a digitally signed OCSP response to a certificate. It reduces the

C

overall OCSP traffic sent to a CA.

stateful firewall— A firewall that filters traffic based on the state of the traffic within a session. A stateful firewall inspects traffic and makes decisions based on the traffic context or state.

et

stateless firewall—A firewall that filters traffic based on the contents of each packet. Stateless firewalls

filter traffic based on IP addresses, ports, and protocols.

G

steganography—The practice of hiding data within data. For example, it’s possible to embed text files within an image, hiding them from casual users. Other methods include hiding data with audio and video files. Steganography can obscure data to hide it. Storage Area Network (SAN)—A specialized network of high-speed storage devices.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

storage segmentation—A method used to isolate data on mobile devices. It allows personal data to be stored in one location and encrypted corporate data to be stored elsewhere. stored procedures—A group of SQL statements that execute as a whole, similar to a mini-program. Developers use stored procedures to prevent SQL injection attacks. loops. A switching loop is caused when two ports of a switch are connected together.

d

STP—Spanning Tree Protocol. Protocol enabled on most switches that protects against switching

ea

stream cipher—An encryption method that encrypts data as a stream of bits or bytes. Compare with block cipher.

Ah

Structured Query Language (SQL)—Used by SQL-based databases, such as Microsoft SQL Server. Websites integrated with a SQL database are subject to SQL injection attacks. Input

validation with forms and stored procedures help prevent SQL injection attacks. Microsoft SQL Server uses TCP port 1433 by default.

et

Subscriber Identity Module (SIM)—A small smart card that contains programming and information for small devices such as cell phones. The SIM card identifies what countries or

G

networks the device will use.

substitution cipher—An encryption method that replaces characters with other characters. Supervisory control and data acquisition (SCADA)—Supervisory control and data acquisition. A

d

system used to control an ICS such as a power plant or water treatment facility. Ideally, a SCADA is

ie

within an isolated network without direct access to the Internet. NIPS systems and VLANs provide a layer of protection for SCADA systems. Compare with ICS.

er tif

supply chain—All the elements required to produce and sell products and services. If the supply chain is disrupted, it impacts an organization’s ability to produce and sell products and services. switch—A network device used to connect devices. Layer 2 switches send traffic to ports based on their MAC addresses. Layer 3 switches send traffic to ports based on their IP addresses and support

C

VLANs.

symmetric encryption—A type of encryption using a single key to encrypt and decrypt data. Symmetric encryption is faster than asymmetric encryption Compare with asymmetric encryption.

et

SYN—Synchronize. The first packet in a TCP handshake. In a SYN flood attack, attackers send this packet, but don’t complete the handshake after receiving the SYN/ACK packet.

G

system on chip (SoC)—An integrated circuit that includes a computing system within the hardware.

Many mobile devices include an SoC.

Copyright 2021 YCDA, LLC v0.1

Pass the First Time with Quality Practice Test Questions https://gcgapremium.com/sy0-601-practice-test-questions/

ea

d

T

tabletop exercise—A discussion-based exercise where participants talk through an event while

sitting at a table or in a conference room. It is often used to test business continuity plans (BCPs) and

Ah

disaster recovery plans (DRPs).

TACACS+—Terminal Access Controller Access-Control System+. Provides central authentication for remote access clients and used as an alternative to RADIUS. TACACS+ uses TCP port 49. It

et

encrypts the entire authentication process, compared with the default RADIUS, which only encrypts the password. It uses multiple challenges and responses. Compare with RADIUS.

G

tainted data—A risk associated with machine learning and AI-enabled systems. People write algorithms, and sometimes people inadvertently insert their bias into their code and data used by their code. As an example, the Correctional Offender Management Profiling for Alternative

d

Sanctions (COMPAS) algorithm used in US court systems to predict recidivism reportedly produced

ie

twice as many false positives for black offenders (45%) than white offenders (23%). Compare with data bias.

er tif

tailgating—A social engineering attack where one person follows behind another person without using credentials. Access control vestibules help prevent tailgating. TCO—Total cost of ownership. A factor considered when purchasing new products and services. TCO attempts to identify the cost of a product or service over its lifetime.

C

TCP—Transmission Control Protocol. Provides guaranteed delivery of IP traffic using a three-way handshake. Compare with UDP. TCP/IP—Transmission Control Protocol/Internet Protocol. Represents the full suite of protocols

et

used on the Internet and most internal networks. tcpdump—A command-line protocol analyzer. Administrators use it to capture packets.

G

tcprelay—A command-line protocol tool. Tcpreplay is a suite of utilities used to edit packet captures

and then send the edited packets over the network. technical controls—Security controls implemented through technology. This includes hardware, software, and firmware technical controls. Compare with managerial and operational controls.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

technology diversity—The practice of using different technologies to protect an environment Compare with control diversity, vendor diversity, and crypto diversity. Terminal Access Controller Access-Control System+ (TACACS+)—Provides central authentication for remote access clients and used as an alternative to RADIUS. TACACS+ uses TCP

d

port 49. It encrypts the entire authentication process, compared with the default RADIUS, which only encrypts the password. It uses multiple challenges and responses. Compare with RADIUS.

ea

tethering—The process of sharing an Internet connection from one mobile device to another.

TFTP—Trivial File Transfer Protocol. Used to transfer small amounts of data with UDP port 69. In

Ah

contrast, FTP is used to transfer larger files using TCP ports 20 and 21.

TGT—Ticket Granting Ticket. Used with Kerberos. A KDC (or TGT server) issues timestamped tickets that expire after a certain time period.

third-party app store—An app store other than the primary source for mobile device apps. It refers

et

to an app store other than the App Store or Google Play for Apple and Android devices, respectively.

G

threat—Any circumstance or event that has the potential to compromise confidentiality, integrity, or availability. Compare with risk and vulnerability.

time-based logins—An account restriction that prevents users from logging on at certain times.

d

Time-based One-Time Password (TOTP)—An open standard used for creating one-time

ie

passwords, TOTP is similar to HOTP, but it uses a timestamp instead of a counter. One-time passwords created with TOTP expire after 30 seconds. Compare with HOTP.

er tif

time offset—An offset used by logs to provide consistency in timestamps. As an example, many logs use Greenwich Mean Time (GMT) for log entries, but a time offset needs to be applied to determine the local time for log entries.

TLS—Transport Layer Security. Used to encrypt data in transit. TLS is the replacement for SSL and

C

like SSL, it uses certificates issued by CAs. HTTPS uses TLS to encrypt web sessions. VPNs can use TLS to encrypt VPN sessions. Several authentication protocols (such as PEAP, EAP-TLS, EAPTTLS) use TLS to encrypt the authentication process. TLS requires a CA to issue certificates.

et

token—An authentication device or file. A hardware token is a physical device used in the something

you have factor of authentication. A software token is a small file used by authentication services

G

indicating a user has logged on. tokenization—A practice of replacing sensitive data with a token which is a string of characters.

Point of sale (POS) terminals use tokenization to replace credit card data with tokens. Only a thirdparty entity (such as the credit card processor) can convert the token into the original data (the credit card data in this example). Copyright 2021 YCDA, LLC v0.1

TOTP—Time-based One-Time Password. An open standard used for creating one-time passwords, TOTP is similar to HOTP, but it uses a timestamp instead of a counter. One-time passwords created with TOTP expire after 30 seconds. Compare with HOTP. TPM—Trusted Platform Module. A hardware chip on the motherboard included on many newer

d

laptops. A TPM includes a unique RSA asymmetric key, and when first used, creates a storage root key. TPMs generate and store other keys used for encryption, decryption, and authentication. TPM

ea

provides full disk encryption. Compare with HSM.

tracert—A command-line tool. It is used to trace the route between two systems.

Ah

Transport Layer Security (TLS)—Used to encrypt data in transit. TLS is the replacement for SSL and like SSL, it uses certificates issued by CAs. HTTPS uses TLS to encrypt web sessions. VPNs can use TLS to encrypt VPN sessions. Several authentication protocols (such as PEAP, EAP-TLS, EAP-TTLS) use TLS to encrypt the authentication process. TLS requires a CA to issue certificates.

et

Trivial File Transfer Protocol (TFTP)—Used to transfer small amounts of data with UDP port 69. In contrast, FTP is used to transfer larger files using TCP ports 20 and 21.

G

Trojan—Malware also known as a Trojan horse. A Trojan often looks useful, but is malicious. Trusted Platform Module (TPM)—A hardware chip on the motherboard included on many newer laptops. A TPM includes a unique RSA asymmetric key, and when first used, creates a storage root

d

key. TPMs generate and store other keys used for encryption, decryption, and authentication. TPM

ie

provides full disk encryption. Compare with HSM.

Twofish—A symmetric key block cipher. It encrypts data in 128-bit blocks and supports 128-, 192-,

er tif

or 256-bit keys. Compare with Blowfish.

typo squatting—The purchase of a domain name that is close to a legitimate domain name. Attackers often try to trick users who inadvertently use the wrong domain name. Also called URL

U

C

hijacking.

et

UAVs—Unmanned aerial vehicles. Flying vehicles piloted by remote control or onboard computers. UDP—User Datagram Protocol. Used instead of TCP when guaranteed delivery of each packet is

G

not necessary. UDP uses a best-effort delivery mechanism. Compare with TCP. UEFI—Unified Extensible Firmware Interface. A method used to boot some systems and intended to replace Basic Input/Output System (BIOS) firmware. Compare with BIOS.

Uniform Resource Locator (URL) redirection—A technique used to redirect traffic to a different page or a different site.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

uninterruptible power supply (UPS)—A battery backup system that provides fault tolerance for power and can protect against power fluctuations. A UPS provides short-term power to give the system enough time to shut down smoothly or transfer to generator power. Generators provide long-term power in

d

extended outages.

ea

unknown environment test—A type of penetration test. Testers have zero knowledge of the

environment prior to starting the test. This was previously known as a black box test. Compare with

Ah

known environment test and partially known environment test.

UPS—Uninterruptible power supply. A battery backup system that provides fault tolerance for power and can protect against power fluctuations. A UPS provides short-term power to give the system enough time outages.

et

to shut down smoothly or transfer to generator power. Generators provide long-term power in extended URI—Uniform Resource Identifier. Used to identify the name of a resource and always includes the

G

protocol such as http://GetCertifiedGetAhead.com.

URL—Uniform Resource Locator. A type of URI. Address used to access web resources, such as http://GetCertifiedGetAhead.com. Pop-up blockers can include URLs of sites where pop-ups are

d

allowed.

ie

URL hijacking—The purchase of a domain name that is close to a legitimate domain name. squatting.

er tif

Attackers often try to trick users who inadvertently use the wrong domain name. Also called typo USB—Universal Serial Bus. A serial connection used to connect peripherals such as printers, flash drives, and external hard disk drives. Data on USB drives can be protected against loss of confidentiality with encryption. Attackers have spread malware through Trojans.

C

USB On-The-Go (OTG). A cable used to connect mobile devices to other devices. It is one of many methods that you can use to connect a mobile device to external media. use case—A methodology used in system analysis and software engineering to identify and clarify

et

requirements to achieve a goal. For example, a use case of supporting confidentiality can help an organization identify the steps required to protect the confidentiality of data.

G

UTM—Unified threat management. A security appliance that combines multiple security controls

into a single solution. UTM appliances can inspect data streams for malicious content and often include URL filtering, malware inspection, and content inspection components.

Copyright 2021 YCDA, LLC v0.1

V VDI—Virtualization Desktop Infrastructure. Virtualization software designed to reproduce a desktop operating system as a virtual machine on a remote server. Users can access VDI desktops

d

from desktop PCs or mobile devices. vendor diversity—The practice of implementing security controls from different vendors to increase

ea

security. Compare with control diversity, technology diversity, and crypto diversity.

version control—A method of tracking changes to software as it is updated.Virtualization Desktop

Ah

Infrastructure (VDI)—Virtualization software designed to reproduce a desktop operating system as a virtual machine on a remote server. Users can access VDI desktops from desktop PCs or mobile devices.

virtualization—A technology that allows you to host multiple virtual machines on a single physical

et

system.

virtual local area network (VLAN)—A method of segmenting traffic. A VLAN can logically

G

group several different computers together, or logically separate computers without regard to their physical location. It is possible to create multiple VLANs with a single switch. You can also create VLANs with virtual switches.

d

virtual machine (VM) escape—An attack that allows an attacker to access the host system from

ie

within a virtual machine. The primary protection is to keep hosts and guests up to date with current patches. Compare with virtual machine sprawl.

er tif

virtual machine (VM) sprawl—A vulnerability that occurs when an organization has VMs that aren’t properly managed. Unmanaged VMs are not kept up to date with current patches. Compare with virtual machine escape.

virtual private network (VPN)—Provides access to a private network over a public network such

C

as the Internet. VPNs can provide access to internal networks for remote clients, or provide access to other networks via site-to-site VPNs. virus—Malicious code that attaches itself to a host application. The host application must be

et

executed to run, and the malicious code executes when the host application is executed. vishing—A phishing attack using phones.Vishing attacks often use Voice over IP (VoIP)

G

technologies.

VLAN—Virtual local area network. A method of segmenting traffic. A VLAN can logically group

several different computers together, or logically separate computers without regard to their physical location. It is possible to create multiple VLANs with a single switch. You can also create VLANs with virtual switches.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

VM—Virtual machine. A virtual system hosted on a physical system. A physical server can host multiple VMs as servers. Virtualization helps reduce the amount of physical equipment required, reducing overall physical security requirements such as HVAC and power. Voice over IP (VoIP)—A group of technologies used to transmit voice over IP networks. Vishing is a

d

form of phishing that sometimes uses VoIP. voice recognition— A biometric authentication system. Voice recognition systems identify who is

ea

speaking using speech recognition.

VoIP—Voice over IP. A group of technologies used to transmit voice over IP networks. Vishing is a

Ah

form of phishing that sometimes uses VoIP.

VPN—Virtual private network. Provides access to a private network over a public network such as the Internet. VPNs can provide access to internal networks for remote clients, or provide access to other networks via site-to-site VPNs.

et

vulnerability—A weakness. It can be a weakness in the hardware, the software, the configuration, or even the users operating the system. Compare with risk and threat.

G

vulnerability scanner—A tool used to detect vulnerabilities. A scan typically identifies vulnerabilities, misconfigurations, and a lack of security controls. It passively tests security controls.

d

W

ie

WAF—Web application firewall—A firewall specifically designed to protect a web application. A

er tif

WAF inspects the contents of traffic to a web server, can detect malicious content such as code used in a cross-scripting attack, and block it.

walkthrough exercise—workshops or orientation seminars that train team members about their roles and responsibilities. Walkthroughs familiarize personnel with an organization’s business continuity plans and their roles and responsibilities.

C

WAP—Wireless access point. A device that connects wireless clients to wireless networks. Sometimes called an access point (AP).

et

warm site—An alternate location for operations. A compromise between an expensive hot site and a

cold site. Compare with cold site and hot site.

G

watering hole attack—An attack method that infects websites that a group is likely to trust and visit.

wearable technology—Smart devices that a person can wear or have implanted.

Copyright 2021 YCDA, LLC v0.1

web application firewall (WAF)—A firewall specifically designed to protect a web application. A WAF inspects the contents of traffic to a web server, can detect malicious content such as code used in a cross-scripting attack, and block it. whaling—A form of spear phishing that attempts to target high-level executives. When successful,

d

attackers gain confidential company information that they might not be able to get anywhere else. purple team, and capture the flag.

ea

white team—Personnel involved in cybersecurity readiness Compare with red team, blue team,

WiFi analyzers—A device used to identify activity on the wireless spectrum. WiFi analyzers are

Ah

commonly used with site surveys. Compare with wireless scanner.

WiFi Direct—A standard that allows devices to connect without a wireless access point. Compare with ad hoc.

WiFi Protected Access 2 (WPA2)—Security protocol used to protect wireless transmissions. It

et

supports CCMP for encryption, which is based on AES. It uses an 802.1X server for authentication in WPA2 Enterprise mode and a preshared key for WPA2 Personal mode, also called WPA2-PSK.

G

WiFi Protected Access 3 (WPA3)—Security protocol used to protect wireless transmissions. WPA3 is the newest wireless cryptographic protocol. It uses Simultaneous Authentication of Equals (SAE) instead of the PSK used with WPA2. SAE is based on the Diffie–Hellman key exchange.

d

WiFi Protected Setup (WPS)—Allowed users to easily configure a wireless network, often by

ie

using only a PIN. WPS brute force attacks can discover the PIN when used with WPA2. wildcard certificate—A certificate that can be used for multiple domains with the same root

er tif

domain. It starts with an asterisk.

wiping—The process of completely removing all remnants of data on a disk. A bit-level overwrite writes patterns of 1s and 0s multiple times to ensure data on a disk is unreadable. wireless access point (WAP)—A device that connects wireless clients to wireless networks.

C

Sometimes called an access point (AP).

wireless scanners—A network scanner that scans wireless frequency bands. Scanners can help discover rogue APs and crack passwords used by wireless APs. Sometimes called WiFi analyzers.

et

Wireshark—A free protocol analyzer. Wireshark is a windows-based application used to capture and analyze packets sent over a network.

G

worm—Self-replicating malware that travels through a network. Worms do not need user interaction

to execute. WPA—WiFi Protected Access. A legacy wireless security protocol. WPA2 and WPA3 have superseded WPA.

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

WPA2—WiFi Protected Access 2. Security protocol used to protect wireless transmissions. It supports CCMP for encryption, which is based on AES. It uses an 802.1X server for authentication in WPA2 Enterprise mode and a preshared key for WPA2 Personal mode, also called WPA2-PSK. WPA3—WiFi Protected Access 3. Security protocol used to protect wireless transmissions. WPA3 is the

d

newest wireless cryptographic protocol. It uses Simultaneous Authentication of Equals (SAE) instead of the PSK used with WPA2. SAE is based on the Diffie–Hellman key exchange.

ea

WPS—WiFi Protected Setup. Allowed users to easily configure a wireless network, often by using only a PIN. WPS brute force attacks can discover the PIN when used with WPA2.

Ah

WPS attack—An attack against an AP. A WPS attack discovers the eight-digit WPS PIN and uses it to discover the AP passphrase. WPA3 is resistant to WPS attacks.

Pass the First Time with Quality Practice Test Questions

et

https://gcgapremium.com/sy0-601-practice-test-questions/

G

X

XaaS—Anything as a Service. A cloud computing model. XaaS refers to any cloud computing model

d

not identified in IaaS, PaaS, or SaaS models. Compare to IaaS, PaaS, and SaaS. XML—Extensible Markup Language. A language used by many databases for inputting or

ie

exporting data. XML uses formatting rules to describe the data.

er tif

XSRF—Cross-site request forgery. A web application attack. Attackers use XSRF attacks to trick users into performing actions on websites, such as making purchases, without their knowledge. In some cases, it allows an attacker to steal cookies and harvest passwords. XSS—Cross-site scripting. A web application vulnerability that allows attackers to inject scripts into webpages. Attackers use XSS to capture user information such as cookies. Input validation

C

techniques on the server-side help prevent XSS attacks by blocking HTML and JavaScript tags.

et

Many sites prevent the use of < and > characters to block cross-site scripting.

G

Z

zero-day vulnerability—A vulnerability or bug that is unknown to trusted sources but can be

exploited by attackers. Zero-day attacks take advantage of zero-day vulnerabilities.

Copyright 2021 YCDA, LLC v0.1

zero trust—A network that doesn’t trust any devices by default. This helps reduce attacks by coming from compromised internal clients. Zero trust isn’t a technology, but instead, it’s a security

Ah

ea

d

model based on the principle of zero trust.

G

et

C

er tif

ie

d

G

et

Version 0.1 May 11 2021

Security+ Practice Test Questions

https://gcgapremiumpass.com/sy0-601-practice-test-questions/

Appendix F—Acronyms This acronym list is derived from the SY0-601 objectives and The CompTIA Security+ Get Certified

d

Get Ahead: SY0-601 Study Guide. By knowing the acronyms, many questions on the live exam will be much easier.

ea

CompTIA often spells out acronyms in the objectives. However, they tend to use acronyms in many test questions. As an example, Objective 5.4 includes these terms: Business impact analysis (BIA) o

Recovery time objective (RTO)

o

Recovery point objective (RPO)

Consider this potential question on the Security+ exam:

Ah



et

Q. Lisa is reviewing an organization’s BIA. It indicates that a key website can tolerate a maximum of three hours of downtime. Administrators have identified several systems that require redundancy

B. MTTR C. MTBF D. RTO

ie

A. RPO

d

maximum of three hours of downtime?

G

additions to meet this maximum downtime requirement. Of the following choices, what term refers to the

er tif

If you know that RTO is an acronym for recovery time objective and understand that “three hours of downtime” refers to time, this question is trivial. The recovery time objective (RTO) identifies the maximum amount of time it can take to restore a system after an outage. Because the business impact analysis (BIA) states that the website can only

C

tolerate three hours of downtime, this identifies the RTO. The recovery point objective (RPO) identifies a point in time where data loss is acceptable, but it doesn’t refer to downtime. The mean time to repair (MTTR) metric and mean time between failures (MTBF) metric refer to an average or arithmetic mean.

et

While the RTO is used to identify the MTTR, MTTR refers to how long it’ll take to repair a system or

G

component, not the maximum amount of downtime for a system or component.

Replace Acronyms with Words When doing practice test questions, it’s best to read all acronyms as words instead of letters. As an example, read this sentence “Lisa is reviewing an organization’s BIA” as Lisa is reviewing an

organization’s business impact analysis. Also, instead of reading the answers as letters, read them as words. If you see the following: A. RPO B. MTTR

d

C. MTBF

ea

D. RTO Read them as the following in your head: A. Recovery point objective

C. Mean time between failures D. Recovery time objective

et

If you forget what an acronym represents, come back here.

Ah

B. Mean time to repair

G

Numbers

3DES—Triple Digital Encryption Standard. A symmetric algorithm is used to encrypt data and provide confidentiality. It is a block cipher that encrypts data in 64-bit blocks. It was initially

ed

designed to replace DES and is still used in some applications, such as when hardware doesn’t support AES.

tif i

A

AAA—Authentication, Authorization, and Accounting. AAA protocols are used in remote access

er

systems. For example, TACACS+ is an AAA protocol that uses multiple challenges and responses during a session. Authentication verifies a user’s identification. Authorization determines if a user

C

should have access. Accounting tracks a user’s access with logs. ABAC—Attribute-based access control. An access control scheme. ABAC grants access to

et

resources based on attributes assigned to subjects and objects. Compare with DAC, MAC, role-based access control, and rule-based access control.

G

ACE—Access Control Entry. Identifies a user or group that is granted permission to a resource. ACEs are contained within a DACL in NTFS. ACK—Acknowledge. A packet in a TCP handshake. In a SYN flood attack, attackers send the SYN packet but don’t complete the handshake after receiving the SYN/ACK packet. ACL—Access control list. Lists of rules used by routers and stateless firewalls. These devices use the ACL to control traffic based on networks, subnets, IP addresses, ports, and some protocols.

Security+ (SY0-601) Practice Questions https://gcgapremiumpass.com/sy0-601-practice-test-questions/

address resolution protocol (ARP) poisoning—An attack that misleads systems about the actual MAC address of a system. ARP poisoning attacks can redirect traffic through an attacker’s system by sending false MAC address updates. AES—Advanced Encryption Standard. A symmetric algorithm used to encrypt data and provide

d

confidentiality. AES is a block cipher, and it encrypts data in 128-bit blocks. It is quick, highly

bits, or 256 bits.

ea

secure, and used in a wide assortment of cryptography schemes. It includes key sizes of 128 bits, 192

AES-256—Advanced Encryption Standard 256 bit. AES sometimes includes the number of bits used

Ah

in the encryption keys, and AES-256 uses 256-bit encryption keys.

AH—Authentication Header. An option within IPsec to provide authentication and integrity. IPsec includes uses AH to provide authentication and integrity using HMAC. ESP provides confidentiality, integrity, and authentication using HMAC and AES or 3DES. AH is identified with protocol ID

et

number 51. Compare with IPSec and ESP.

ALE—Annualized (or annual) loss expectancy. The expected loss for a year. The ALE identifies the

G

expected annual loss and is used to measure risk with ARO and SLE in a quantitative risk assessment. The calculation is SLE × ARO = ALE. Compare with SLE and ARO.

wireless access point (WAP).

d

AP—Access point. A device that connects wireless clients to wireless networks. Sometimes called a

ie

API—Application programming interface. A software module or component. An API gives developers access to features or data within another application, service, or operating system. APIs

er tif

are often used with web applications, Internet of Things (IoT) devices, and cloud-based services. API attacks—Application programming interface attacks. Attacks on an API. API attacks attempt to discover and exploit vulnerabilities in APIs.

APT—Advanced persistent threat. A group that has both the capability and intent to launch

C

sophisticated and targeted attacks. A nation state (such as a foreign government) sponsors APTs. ARO—Annualized (or annual) rate of occurrence. The number of times a loss is expected to occur in a year. The ARO is used to measure risk with ALE and SLE in a quantitative risk assessment. The

et

calculation is SLE × ARO = ALE. Compare with SLE and ALE. ARP—Address Resolution Protocol. Resolves IPv4 addresses to MAC addresses. Compare with arp.

G

ARP poisoning—An attack that misleads systems about the actual MAC address of a system. ARP poisoning attacks can redirect traffic through an attacker’s system by sending false MAC address updates. ASCII—American Standard Code for Information Interchange. Code used to display characters.

Copyright 2021 YCDA, LLC

AUP—Acceptable use policy. A policy defining proper system usage and the rules of behavior for employees. It will often describe the purpose of computer systems and networks, how users can access

them, and the responsibilities of users when accessing the systems.

d

B

ea

BCP—Business continuity plan. A plan that helps an organization predict and plan for potential

outages of critical services or functions. It includes disaster recovery elements that provide the steps used to return critical functions to operation after an outage. A BIA is a part of a BCP, and the BIA

Ah

drives decisions to create redundancies such as failover clusters or alternate sites. Compare with BIA and DRP.

BIA—Business impact analysis. A process that helps an organization identify critical systems and

et

components that are essential to the organization’s success. It identifies various scenarios that can impact these systems and components, maximum downtime limits, and potential losses from an

G

incident. The BIA helps identify RTOs and RPOs. Compare with BCP, BIA, DRP, RTO, and RPO. BIND—Berkeley Internet Name Domain. BIND is DNS software that runs on Linux and Unix servers. Most Internet-based DNS servers use BIND.

d

BIOS—Basic Input/Output System. A computer’s firmware that is used to manipulate different

ie

settings such as the date and time, boot drive, and access password. UEFI is the designated replacement for BIOS. Compare with UEFI.

er tif

BPDU guard—Bridge Protocol Data Unit guard. A technology that detects false BPDU messages. False BPDU messages can indicate a switching loop problem and shut down switch ports. The BPDU guard detects false BPDU messages and blocks the BPDU attack. BYOD—Bring your own device. A mobile device deployment model. A BYOD model allows

C

employees to connect personally owned devices, such as tablets and smartphones, to a company network. Data security is often a concern with BYOD policies causing organizations to consider

Pass the First Time with Quality Practice Test Questions https://gcgapremium.com/sy0-601-practice-test-questions/

G

et

CYOD or COPE models. Compare with COPE and CYOD.

C

CA—Certificate Authority. An organization that manages, issues, and signs certificates and is part of a PKI. Certificates are an essential part of asymmetric encryption, and they include public keys

Security+ (SY0-601) Practice Questions https://gcgapremiumpass.com/sy0-601-practice-test-questions/

and details on the owner of the certificate and the CA that issued the certificate. Certificate owners share their public key by sharing a copy of their certificate. Compare with PKI. CAPTCHA—Completely Automated Public Turing Test to Tell Computers and Humans Apart. Technique used to prevent automated tools from interacting with a website. Users must type in text

d

often from a slightly distorted image. CASB—Cloud access security broker. A software tool or service that enforces cloud-based

ea

security requirements. It is placed between the organization’s resources and the cloud, monitors all network traffic, and can enforce security policies.

Ah

CBC—Cipher Block Chaining. A mode of operation used by some symmetric encryption ciphers. It uses an IV for the first block, and each subsequent block is combined with the previous block. CCMP—Counter Mode with Cipher Block Chaining Message Authentication Code Protocol. An encryption protocol based on AES and used with WPA2 for wireless security.

et

CCTV—Closed-circuit television. A detective control that provides video surveillance. Video surveillance provides reliable proof of a person’s location and activity. It is also a physical security

G

control, and it can increase the safety of an organization’s assets.

CER—Canonical Encoding Rules. A base format for PKI certificates. They are ASCII encoded files. Compare with DER.

d

CERT—Computer Emergency Response Team. A group of experts who respond to security

ie

incidents.

CHAP—Challenge Handshake Authentication Protocol. An authentication mechanism where a

er tif

server challenges a client. Compare with MS-CHAPv2 and PAP. CIA—Confidentiality, integrity, and availability. These three form the security triad. Confidentiality helps prevent the unauthorized disclosure of data. Integrity provides assurances that data has not been modified, tampered with, or corrupted. Availability indicates that data and services are

C

available when needed.

CIO—Chief Information Officer. A “C” level executive position in some organizations. A CIO

et

focuses on using methods within the organization to answer relevant questions and solve problems. COOP—Continuity of operations planning. Continuity of operations planning sites provide an

G

alternate location for operations after a critical outage. A hot site includes personnel, equipment, software, and communication capabilities of the primary site with all the data up to date. A cold site will have power and connectivity needed for COOP activation, but little else. A warm site is a compromise between a hot site and a cold site. Compare with hot site, cold site, and warm site. COPE—Corporate-owned, personally enabled. A mobile device deployment model. The organization purchases and issues devices to employees. Compare with BYOD and CYOD. Copyright 2021 YCDA, LLC

CRL—Certification revocation list. A list of certificates that a Certificate Authority (CA) has revoked. Certificates are commonly revoked if they are compromised or issued to an employee who has left the organization. The CA that issued the certificate publishes a CRL, and a CRL is public. CSF—Cybersecurity Framework. A framework that aligns with the RMF and can be used in the

d

private sector. NIST SP 800-37, “Risk Management Framework for Information Systems and

ea

Organizations” is targeted toward federal government agencies. The CSF is an alternative that fits the private sector. It includes three components: the framework core, the framework implantation tiers, and the framework profiles.

Ah

CSR—Certificate signing request. A method of requesting a certificate from a CA. It starts by

creating an RSA-based private/public key pair and then including the public key in the CSR. Most CAs require CSRs to be formatted using the Public-Key Cryptography Standards (PKCS) #10 specification.

The combined result is used to encrypt blocks.

et

CTM—Counter mode. A mode of operation used for encryption that combines an IV with a counter.

G

CTO—Chief Technology Officer. A “C” level executive position in some organizations. CTOs focus on technology and evaluate new technologies.

vulnerabilities and exposures.

d

CVE—Common Vulnerabilities and Exposures. A dictionary of publicly known security

ie

CYOD—Choose your own device. A mobile device deployment model. Employees can connect their personally owned device to the network as long as the device is on a preapproved list. Note that

er tif

the device is purchased by and owned by employees. Compare with BYOD and COPE.

D

C

DAC—Discretionary access control. An access control scheme. All objects (files and folders) have owners, and owners can modify permissions for the objects. Compare with ABAC, MAC, role-based access control, and rule-based access control.

et

DDoS—Distributed denial-of-service. An attack on a system launched from multiple sources. DDoS attacks consume a system’s resources resulting in resource exhaustion. DDoS attacks typically

G

include sustained, abnormally high network traffic. Compare to DoS. DEP—Data Execution Prevention. A security feature in some operating systems. DEP prevents an application or service from executing in memory regions marked as nonexecutable. DEP can block some malware.

Security+ (SY0-601) Practice Questions https://gcgapremiumpass.com/sy0-601-practice-test-questions/

DER—Distinguished Encoding Rules. A base format for PKI certificates. They are BASE64 binary encoded files. Compare with CER. DH—Diffie-Hellman. An asymmetric algorithm used to privately share symmetric keys. DH Ephemeral (DHE) uses ephemeral keys, which are re-created for each session. Elliptic Curve DHE

d

(ECDHE) uses elliptic curve cryptography to generate encryption keys.

ea

DHCP—Dynamic Host Configuration Protocol. A service used to dynamically assign TCP/IP

configuration information to clients. DHCP is often used to assign IP addresses, subnet masks, default gateways, DNS server addresses, and much more.

Ah

DHCP snooping—Dynamic Host Configuration Protocol (DHCP) snooping. A preventive measure used to prevent unauthorized DHCP servers. It is enabled on Layer 2 switch ports. When enabled, the switch only sends DHCP broadcast traffic (the DHCP discover message) to trusted ports. DHE—Diffie-Hellman Ephemeral. An alternative to traditional Diffie-Hellman. Instead of using

et

static keys that stay the same over a long period, DHE uses ephemeral keys, which change for each new session. Sometimes listed as EDH.

G

DLL—Dynamic-link library. A compiled set of code that can be called from other programs. DLL injection— Dynamic-link library injection. An attack that injects a Dynamic Link Library (DLL) into memory and runs it. Attackers rewrite the DLL, inserting malicious code.

d

DLP—data loss prevention. A group of technologies used to prevent data loss. End-point DLP

ie

systems can prevent users from copying or printing sensitive data. Network-based DLP systems

the cloud.

er tif

monitor outgoing email to detect and block unauthorized data transfers and monitor data stored in

DMZ—demilitarized zone. A buffer zone between the Internet and an internal network. It allows access to services while segmenting access to the internal network. Internet clients can access the services hosted on servers in the DMZ, but the DMZ provides a layer of protection for the internal

C

network. CompTIA is using the term screened subnet to replace DMZ. DNS—Domain Name System. Used to resolve hostnames to IP addresses. DNS zones include

et

records such as A records for IPv4 addresses, AAAA records for IPv6 addresses, and MX records to identify mail servers. DNS uses UDP port 53 for DNS client queries and TCP port 53 for zone

G

transfers. Compare with DNS poisoning and pharming. DNS poisoning— Domain Name System poisoning. An attack that modifies or corrupts DNS results. DNSSEC helps prevent DNS poisoning. DNSSEC—Domain Name System Security Extensions. A suite of extensions to DNS used to protect the integrity of DNS records and prevent some DNS attacks.

Copyright 2021 YCDA, LLC

DoS—denial-of-service. An attack from a single source. A DoS attack attempts to disrupt the services provided by the attacked system. Compare to DDoS. DRP—disaster recovery plan. A document designed to help a company respond to disasters, such as hurricanes, floods, and fires. It includes a hierarchical list of critical systems and often prioritizes

d

services to restore after an outage. Testing validates the plan. The final phase of disaster recovery

ea

includes a review to identify any lessons learned and may include an update of the plan. Compare with BCP and BIA.

DSA—Digital Signature Algorithm. The algorithm used to create a digital signature. A digital

Ah

signature is an encrypted hash of a message. The sender’s private key encrypts the hash of the

message to create the digital signature. The recipient decrypts the hash with the sender’s public key, and, if successful, it provides authentication, non-repudiation, and integrity. Authentication identifies the sender. Integrity verifies the message has not been modified. Non-repudiation is used with online

et

transactions and prevents the sender from later denying he sent the email.

G

E

EAP—Extensible Authentication Protocol. An authentication framework that provides general

d

guidance for authentication methods. Variations include EAP-TLS, EAP-TTLS, and PEAP.

ie

EAP-FAST—EAP-Flexible Authentication via Secure Tunneling. A Cisco-designed protocol sometimes used with 802.1X. EAP-FAST supports certificates, but they are optional. Compare with

er tif

EAP, EAP-TLS, EAP-TTLS, and PEAP.

EAP-TLS—Extensible Authentication Protocol-Transport Layer Security. An extension of EAP sometimes used with 802.1X. This is one of the most secure EAP standards and is widely implemented. The primary difference between PEAP and EAP-TLS is that EAP-TLS requires certificates on the 802.1X

C

server and on each of the wireless clients. Compare with EAP, EAP-TTLS, EAP-FAST, and PEAP. EAP-TTLS—Extensible Authentication Protocol-Tunneled Transport Layer Security. An extension of EAP sometimes used with 802.1X. It allows systems to use some older authentication methods such as

et

PAP within a TLS tunnel. It requires a certificate on the 802.1X server but not on the clients. Compare with EAP, EAP-TLS, EAP-FAST, and PEAP.

G

ECC—Elliptic curve cryptography. An asymmetric encryption algorithm commonly used with smaller wireless devices. It uses smaller key sizes and requires less processing power than many other encryption methods. ECDHE—Elliptic Curve Diffie-Hellman Ephemeral. A version of Diffie-Hellman that uses ECC to generate encryption keys. Ephemeral keys are re-created for each session.

Security+ (SY0-601) Practice Questions https://gcgapremiumpass.com/sy0-601-practice-test-questions/

EMI—Electromagnetic interference. Interference caused by motors, power lines, and fluorescent lights. EMI shielding prevents outside interference sources from corrupting data and prevents data from emanating outside the cable. ESP—Encapsulating Security Protocol. A part of IPsec that provides encryption. IPsec includes both AH

d

and ESP. AH provides authentication and integrity using HMAC. ESP provides confidentiality, integrity,

ea

and authentication using HMAC and AES or 3DES. ESP is identified with protocol ID number 50.

F

Ah

FAR—False acceptance rate. Also called the false match rate. A rate that identifies the percentage of times a biometric authentication system incorrectly indicates a match.

FDE—Full disk encryption. A method to encrypt an entire disk. Compare with SED.

et

FRR—False rejection rate. Also called the false nonmatch rate. A rate that identifies the percentage of times a biometric authentication system incorrectly rejects a valid match.

G

FTP—File Transfer Protocol. Used to upload and download files to an FTP server. FTP uses TCP ports 20 and 21. Secure FTP (SFTP) uses SSH for encryption on TCP port 22. FTP Secure (FTPS) uses SSL or TLS for encryption.

d

FTPS—File Transfer Protocol Secure. An extension of FTP that uses SSL to encrypt FTP traffic.

ie

Some implementations of FTPS use TCP ports 989 and 990. Pass the First Time with Quality Practice Test Questions

er tif

https://gcgapremium.com/sy0-601-practice-test-questions/

G

C

GCM—Galois/Counter Mode. A mode of operation used for encryption. It combines the Counter (CTM) mode with hashing techniques for data authenticity and confidentiality.

et

GDPR—General Data Protection Regulation. The GDPR is a European Union (EU) regulation that clarifies requirements to protect the personal data of anyone living in the EU. It also defines the

G

roles of data owners, data controllers, data processors, data custodians or data stewards, and the data protection officer (DPO). GPS—Global Positioning System. A satellite-based navigation system that identifies the location of a device or vehicle. Mobile devices often incorporate GPS capabilities.

Copyright 2021 YCDA, LLC

GPS tagging—Global Positioning System tagging. A process of adding geographical data to files such as pictures. It typically includes latitude and longitude coordinates of the location where the photo was taken, or the file was created.

d

H

ea

HIDS—Host-based intrusion detection system. HIDS is software installed on a system to detect

attacks. A HIDS is used to monitor an individual server or workstation. It protects local resources on

by antivirus software. Compare with HIPS, NIDS, and NIPS.

Ah

the host such as the operating system files, and in some cases, it can detect malicious activity missed

HIPS—Host-based intrusion prevention system. An extension of a host-based IDS. It is designed to react in real time to detect, and prevent, an attack in action. Compare with HIDS, NIDS, and NIPS.

et

HMAC—Hash-based Message Authentication Code. A hashing algorithm used to verify integrity and authenticity of a message with the use of shared secret. When used with TLS and IPsec, HMAC

G

is combined with MD5 and SHA-1 as HMAC-MD5 and HMAC-SHA1, respectively. HOTP—HMAC-based One-Time Password. An open standard used for creating one-time passwords, similar to those used in tokens or key fobs. It combines a secret key and an incrementing

ie

they are used. Compare with TOTP.

d

counter, and then uses HMAC to create a hash of the result. HOTP passwords do not expire until

HSM—Hardware security module. A removable or external device that can generate, store, and

er tif

manage RSA keys used in asymmetric encryption. High-volume e-commerce sites use HSMs to increase the performance of TLS sessions. Compare with TPM. HTML—Hypertext Markup Language. A language used to create webpages. HTML documents are displayed by web browsers and delivered over the Internet using HTTP or HTTPS. It uses less-than

C

and greater-than characters (< and >) to create tags. Many sites use input validation to block these tags and prevent cross-site scripting attacks. HTTP—Hypertext Transfer Protocol. Used for web traffic on the Internet and in intranets. HTTP

et

uses TCP port 80. HTTP is almost always encrypted with TLS and referred to as HTTPS. HTTPS—Hypertext Transfer Protocol Secure. A protocol used to encrypt HTTP traffic. HTTPS

G

encrypts HTTP traffic with TLS using TCP port 443. HVAC—Heating, ventilation, and air conditioning. A physical security control that increases availability by regulating airflow within data centers and server rooms. They use hot and cold aisles to regulate the cooling, thermostats to ensure a relatively constant temperature, and humidity controls to reduce the potential damage from condensation.

Security+ (SY0-601) Practice Questions https://gcgapremiumpass.com/sy0-601-practice-test-questions/

I

d

IaaS—Infrastructure as a Service. A cloud computing model. IaaS allows an organization to rent

ea

access to hardware in a self-managed platform. Customers are responsible for keeping an IaaS system up to date. Compare to PaaS, SaaS, and XaaS.

ICMP—Internet Control Message Protocol. Used for diagnostics such as ping. Many DoS attacks

to a server succeeds, it indicates that ICMP is blocked.

Ah

use ICMP. It is common to block ICMP at firewalls and routers. If ping fails, but other connectivity

ICS—Industrial control system. A system that controls large systems such as power plants or water

et

treatment facilities. A SCADA system typically controls an ICS. Compare with SCADA.

IDS—Intrusion detection system. A detective control used to detect attacks after they occur. A

G

network-based IDS (NIDS) monitors a network, and a host-based IDS (HIDS) monitors a host. They both monitor for intrusions and provides ongoing protection against various threats. IDSs include sniffing capabilities. Many IDSs use numbering systems to identify vulnerabilities. Compare with

d

IPS.

ie

IEEE—Institute of Electrical and Electronics Engineers. IEEE is an international organization with a focus on electrical, electronics, and information technology topics. IEEE standards are well

er tif

respected and followed by vendors around the world. IEEE 802.1X—A port-based authentication protocol. An authentication protocol used in VPNs and wired and wireless networks. VPNs often implement it as a RADIUS server. Wired networks use it for port-based authentication. Wireless networks use it in Enterprise mode, and it often uses one of

C

the EAP authentication protocols. Compare with EAP, PEAP, EAP-TLS, and EAP-TTLS. IGMP—Internet Group Management Protocol. Used for multicasting. Computers belonging to a multicasting group have a multicasting IP address in addition to a standard unicast IP address.

et

IIS—Internet Information Services. A Microsoft Windows web server. IIS comes free with Microsoft Windows Server products. Linux systems use Apache as a web server.

G

IMAP4—Internet Message Access Protocol v4. Used to store email on servers and allow clients to manage their email on the server. IMAP4 uses TCP port 143. Secure IMAP4 uses TLS to encrypt IMAP4 traffic on TCP port 993.

IoT—Internet of things. The network of physical devices connected to the Internet. It typically refers to smart devices with an IP address, such as wearable technology and home automation systems.

Copyright 2021 YCDA, LLC

IP—Internet Protocol. Used for addressing. Compare with IPv4 and IPv6. IPS—Intrusion prevention system. A preventive control that can stop an attack in progress. It is similar to an active IDS except that it’s placed inline with traffic. An IPS can actively monitor data streams, detect malicious content, and stop attacks in progress. It can be used internally to protect

d

private networks, such as those holding SCADA equipment. Compare with IDS.

ea

IPv4—Internet Protocol version 4. Identifies hosts using a 32-bit IP address. IPv4 is expressed in dotted decimal format with decimal numbers separated by dots or periods like this: 192.168.1.1.

IPv6—Internet Protocol version 6. Identifies hosts using a 128-bit address. IPv6 has a significantly

Ah

larger address space than IPv4. IPsec is built into IPv6 and can encrypt any type of IPv6 traffic. ISP—Internet Service Provider. A company that provides Internet access to customers.

IT—Information technology. Computer systems and networks used within organizations.

IV—Initialization vector. An IV provides randomization of encryption keys to help ensure that keys

et

are not reused. In an IV attack, the attacker uses packet injection to increase the number of packets to

G

analyze and discovers the encryption key.

Pass the First Time with Quality Practice Test Questions

d

https://gcgapremium.com/sy0-601-practice-test-questions/

ie

K

er tif

KDC—Key Distribution Center. Also known as Ticket Granting Ticket (TGT) server. Part of the Kerberos protocol used for network authentication. The KDC issues timestamped tickets that expire.

L

C

L2TP—Layer 2 Tunneling Protocol. Tunneling protocol used with VPNs. L2TP is commonly used with IPsec (L2TP/IPsec) and uses UDP port 1701.

et

LDAP—Lightweight Directory Access Protocol. A protocol used to communicate with directories such as Microsoft Active Directory. It identifies objects with query strings using codes such as

G

CN=Users and DC=GetCertifiedGetAhead. LDAP uses TCP port 389. LDAP injection attacks attempt to access or modify data in directory service databases. Compare with LDAPS. LDAPS—Lightweight Directory Access Protocol over SSL. A protocol used to encrypt LDAP traffic with TLS. While it has SSL in the name, TLS has replaced SSL. LDAPS is sometimes referred to as Lightweight Directory Access Protocol Secure. LDAPS encrypts transmissions with TLS over TCP port 636. Compare with LDAP.

Security+ (SY0-601) Practice Questions https://gcgapremiumpass.com/sy0-601-practice-test-questions/

M MAC—Mandatory Access Control. An access control scheme. MAC uses sensitivity labels assigned to objects (files and folders) and subjects (users). MAC restricts access based on a need to know.

d

Compare with ABAC, DAC, role-based access control, and rule-based access control. MAC—media access control. A 48-bit address used to identify network interface cards. It is also

ea

called a hardware address or a physical address. and is commonly displayed as six pairs of

hexadecimal characters. Port security on a switch or an AP can limit access using MAC filtering.

Ah

MAC cloning attack—Media access control cloning attack. An attack that changes the source MAC address to impersonate an authorized system. When MAC filtering is used, attackers can discover the address of authorized MAC addresses and change their address to bypass MAC filtering. This is sometimes called MAC spoofing.

et

MAC filtering—Media access control filtering. A form of network access control to allow or block access based on the MAC address. It is configured on switches for port security or on APs for

G

wireless security.

MAC flooding—Media access control flooding. An attack against a switch that attempts to overload it. Most ports on a switch have only a single host connected to them, with only a single MAC

d

address. A MAC flooding attack repeatedly spoofs the MAC address. If successful, the switch

ie

operates as a hub instead of as a switch.

MD5—Message Digest 5. A hashing function used to provide integrity. MD5 creates 128-bit hashes,

er tif

which are also referred to as MD5 checksums. A hash is simply a number created by applying the algorithm to a file or message at different times. Comparing the hashes verifies integrity. Experts consider MD5 cracked and discourage its use as a cryptographic hash. However, it is still used as a checksum in some situations.

C

MDM—Mobile device management. A group of applications and technologies used to manage mobile devices. MDM tools can monitor mobile devices and ensure they are in compliance with

et

security policies.

MMS—Multimedia Messaging Service. An extension of SMS. MMS allows users to include multimedia content such as pictures, short videos, audio, or even a slideshow of multiple images.

G

Compare with SMS and Rich Communication Services. MS-CHAP—Microsoft Challenge Handshake Authentication Protocol. Microsoft implementation of CHAP. MS-CHAPv2 improves MS-CHAP by providing mutual authentication.

Copyright 2021 YCDA, LLC

MS-CHAPv2—Microsoft Challenge Handshake Authentication Protocol version 2. Microsoft implementation of CHAP. MS-CHAPv2 provides mutual authentication. Compare with CHAP and PAP. MTBF—Mean time between failures. Provides a measure of a system’s reliability and is usually

d

represented in hours. The MTBF identifies the average (the arithmetic mean) time between failures.

ea

Higher MTBF numbers indicate a higher reliability of a product or system.

MTTF—Mean time to failure. The length of time you can expect a device to remain in operation

before it fails. It is similar to MTBF, but the primary difference is that the MTBF metric indicates

Ah

you can repair the device after it fails. The MTTF metric indicates that you will not be able to repair a device after it fails.

MTTR—Mean time to recover. Identifies the average (the arithmetic mean) time it takes to restore a failed system. Organizations that have maintenance contracts often specify the MTTR as a part of

et

the contract.

G

N

NAC—Network access control. A system that inspects clients to ensure they are healthy. Healthy

d

clients are granted access to the network, and unhealthy clients are redirected to a remediation

ie

network. Agents inspect clients, and agents can be permanent or dissolvable (also known as agentless). MAC filtering is a form of NAC.

er tif

NAT—Network Address Translation. A service that translates public IP addresses to private IP addresses and private IP addresses to public IP addresses. NDA—Non-disclosure agreement. An agreement that is designed to prohibit personnel from sharing proprietary data. It can be used with employees within the organization and with outside

C

organizations. It is commonly embedded as a clause in a contract. NFC—Near field communication. A group of standards used on mobile devices that allow them to communicate with other nearby mobile devices. Many credit card readers support payments using

et

NFC technologies with a smartphone. NIC—Network interface card. Provides connectivity to a network. A NIC is typically built into a

G

circuit board and includes a connector, such as an RJ-45 connector. NIC teaming—Network interface card (NIC) teaming. A group of two or more network adapters acting as a single network adapter. NIC teaming provides increased bandwidth and load balancing capabilities.

Security+ (SY0-601) Practice Questions https://gcgapremiumpass.com/sy0-601-practice-test-questions/

NIDS—Network-based intrusion detection system. A device that detects attacks and raises alerts. A NIDS is installed on network devices, such as routers or firewalls and monitors network traffic. It can detect network-based attacks. NIPS—Network-based intrusion prevention system. A device that detects and stops attacks in

d

progress. A NIPS is placed inline (also called in-band) with traffic so that it can actively monitor

ea

data streams, detect malicious content, and stop attacks in progress.

NIST—National Institute of Standards and Technology. NIST is a part of the U.S. Department of

Commerce, and it includes an Information Technology Laboratory (ITL). The ITL publishes special

Ah

publications related to security that are freely available to anyone. They can found at http://csrc.nist.gov/publications/PubsSPs.html.

NTLM—New Technology LAN Manager. A suite of protocols that provide confidentiality, integrity, and authentication within Windows systems. Versions include NTLM, NTLMv2, and

et

NTLM2 Session.

G

NTP—Network Time Protocol. Protocol used to synchronize computer times.

Pass the First Time with Quality Practice Test Questions

d

https://gcgapremium.com/sy0-601-practice-test-questions/

ie

O

er tif

OAuth—An open source standard used for authorization with Internet-based single sign-on solutions. Many companies such as Google, Facebook, PayPal, Microsoft, and Twitter support OAuth. Users can sign on with their account using one of these companies and gain access to other sites. OAuth focuses on authorization, not authentication, and RFC 6749, “The OAuth 2.0

C

Authorization Framework,” describes it.

OCSP—Online Certificate Status Protocol. An alternative to using a CRL. It allows entities to query a CA with the serial number of a certificate. The CA answers with good, revoked, or unknown.

et

OIDC - OpenID Connect—An open source standard used for identification on the Internet. It builds on OpenID and uses the OAuth 2.0 framework. OIDC uses a JavaScript Object Notation

G

(JSON) Web Token (JWT), sometimes called an ID token. OpenID—An authentication standard maintained by the OpenID Foundation. An OpenID provider holds the user’s credentials and websites that support OpenID prompt users to enter their OpenID. OSI—Open Systems Interconnection. The OSI reference model conceptually divides different networking requirements into seven separate layers.

Copyright 2021 YCDA, LLC

OSINT—A method of gathering data using public sources, such as social media sites and news outlets. Pass the First Time with Quality Practice Test Questions

d

https://gcgapremium.com/sy0-601-practice-test-questions/

ea

P

P12—PKCS#12. A common format for PKI certificates. They are DER-based (binary) and often hold certificates with the private key. They are commonly encrypted.

Ah

P7B—PKCS#7. A common format for PKI certificates. They are CER-based (ASCII) and commonly used to share public keys.

PaaS—Platform as a Service. A cloud computing model. PaaS provides cloud customers with a

et

preconfigured computing platform they can use as needed. PaaS is a fully managed platform, meaning that the vendor keeps the platform up to date with current patches. Compare with IaaS,

G

SaaS and XaaS.

PAM—Privileged access management. A method of protecting access to privileged accounts. PAM implements the concept of just-in-time administration, giving users elevated privileges only when

d

they need them and only for a limited time. PAM is sometimes called privileged account

ie

management.

PAP—Password Authentication Protocol. An older authentication protocol where passwords or

er tif

PINs are sent across the network in cleartext. Compare with CHAP and MS-CHAPv2. PBKDF2—Password-Based Key Derivation Function 2. A key stretching algorithm technique that adds additional bits to a password as a salt. It helps prevent brute force and rainbow table attacks. Compare with Bcrypt and Argon2.

C

PDF—Portable Document Format. Type of file for documents. Attackers have embedded malware in PDFs.

PEAP—Protected Extensible Authentication Protocol. An extension of EAP sometimes used with

et

802.1X. PEAP provides an extra layer of protection for EAP and it is sometimes used with 802.1X. PEAP requires a certificate on the 802.1X server. Compare with EAP, EAP-TLS, EAP-TTLS, and

G

EAP-FAST.

PEM—Privacy Enhanced Mail. A common format for PKI certificates. It can use either CER (ASCII) or DER (binary) formats and can be used for almost any type of certificates. PFX—Personal Information Exchange. A common format for PKI certificates. It is the predecessor to P12 certificates.

Security+ (SY0-601) Practice Questions https://gcgapremiumpass.com/sy0-601-practice-test-questions/

PHI—Personal Health Information. PII that includes health information. PII—Personally Identifiable Information. Information about individuals that can be used to trace a person’s identity, such as a full name, birth date, biometric data, and identifying numbers such as a Social Security number (SSN). Organizations have an obligation to protect PII and often identify

d

procedures for handling and retaining PII in data policies such as encrypting it.

ea

PIN—Personal identification number. A number known by a user and entered for authentication. PINs are often combined with smart cards to provide dual-factor authentication.

PIV—Personal Identity Verification card. A specialized type of smart card used by U.S. federal

Ah

agencies. It includes photo identification and provides confidentiality, integrity, authentication, and non-repudiation for the users. Compare with CAC.

PKI—Public Key Infrastructure. Group of technologies used to request, create, manage, store, distribute, and revoke digital certificates. Certificates include public keys along with details on the

et

owner of the certificate, and on the CA that issued the certificate. Certificate owners share their public key by sharing a copy of their certificate. A PKI requires a trust model between CAs and most

G

trust models are hierarchical and centralized with a central root CA.

POP3—Post Office Protocol v3. Used to transfer email from mail servers to clients. POP3 uses TCP port 110 for unencrypted connections and TCP port 995 for encrypted connections

d

PSK—Preshared key. A secret shared among different systems. Wireless networks using WPA2

ie

support Personal mode, where each device uses the same PSK. WPA3 uses a Simultaneous Authentication of Equals (SAE) instead of a PSK. Compare with Enterprise and Open modes.

er tif

PUPs—Potentially unwanted programs. Software installed on users’ systems without their awareness or consent. Some of these unwanted programs are legitimate, but some are malicious,

R

C

such as Trojans. Compare with spyware.

RA—Recovery agent. A designated individual who can recover or restore cryptographic keys. In the

et

context of a PKI, a recovery agent can recover private keys to access encrypted data, or in some situations, recover the data without recovering the private key. In some cases, recovery agents can

G

recover the private key from a key escrow. RADIUS—Remote Authentication Dial-In User Service. Provides central authentication for remote access clients. RADIUS uses symmetric encryption to encrypt the password packets, and it uses UDP by default. In contrast, TACACS+ encrypts the entire authentication process and uses TCP.

Copyright 2021 YCDA, LLC

RFC 3579 “RADIUS Support for EAP” supports encryption of the entire authentication process using TCP. Compare with TACACS+. RAID—Redundant array of inexpensive disks. Multiple disks added together to increase performance or provide protection against faults. RAID helps prevent disk subsystems from being a

d

single point of failure. Compare with RAID-0, RAID-1, RAID-5, RAID-6, and RAID-10.

ea

RAID-0—Disk striping. RAID-0 improves performance but does not provide fault tolerance. RAID-1—Disk mirroring. RAID-1 uses two disks and provides fault tolerance.

RAID-5—Disk striping with parity. RAID-5 uses three or more disks and provides fault tolerance. It

Ah

can survive the failure of a single drive.

RAID-6—Disk striping with parity. RAID-6 uses four or more disks and provides fault tolerance. It can survive the failure of two drives.

RAID-10—Disk mirroring with striping. RAID-10 combines the features of mirroring (RAID-1) and

et

striping (RAID-0). The minimum number of drives in a RAID-10 is four, and a RAID-10 always has an even number of drives.

G

RAM—Random access memory. Volatile memory within a computer that holds active processes, data, and applications. Data in RAM is lost when the computer is turned off. Memory forensics analyzes data in RAM.

ie

location using dial-up or a VPN.

d

RAS—Remote Access Service. Provides access to an internal network from an outside source

RAT—Remote access Trojan. Malware that allows an attacker to take control of a system from a

er tif

remote location. A RAT gives an attacker full control over a user’s system from a remote location over the Internet.

RDP—Remote Desktop Protocol. Used to connect to remote systems. Microsoft uses RDP in different services such as Remote Desktop Services and Remote Assistance. RDP uses either port

C

TCP 3389 or UDP 3389.

RFI—Radio frequency interference. Interference from RF sources such as AM or FM transmitters.

et

RFI can be filtered to prevent data interference, and cables can be shielded to protect signals from RFI.

G

RFID—Radio frequency identification. RFID methods are often used for inventory control. RFID attacks— Radio frequency identification attacks. Attacks against radio-frequency identification (RFID) systems. Some common RFID attacks are eavesdropping, replay, and DoS. RCS—Rich Communication Services. An extension of SMS and MMS. RCS supports all of the features of MMS and adds a few additional features. If a system doesn’t support RCS, it can default to SMS or MMS. Compare with SMS and MMS.

Security+ (SY0-601) Practice Questions https://gcgapremiumpass.com/sy0-601-practice-test-questions/

RMF—Risk Management Framework. A framework for identifying and managing risk. NIST published it as SP 800-37, “Risk Management Framework for Information Systems and Organizations.” It includes seven steps: prepare, categorizing information systems, select security controls, assess security controls, authorize information systems, monitor security controls.

d

rogue AP—Rogue access point. An unauthorized AP. It can be placed by an attacker or an

ea

employee who hasn’t obtained permission to do so. An evil twin is a special type of rogue AP with the same or similar SSIS as a legitimate AP.

ROI—Return of investment or return on investment. A performance measure used to identify when

Ah

an investment provides a positive benefit to the investor. It is sometimes considered when evaluating the purchase of new security controls.

ROT13—A substitution cipher that uses a key of 13. To encrypt a message, you would rotate each letter 13 spaces. To decrypt a message, you would rotate each letter 13 spaces.

et

RPO—Recovery point objective. A term that refers to the amount of data you can afford to lose by identifying a point in time where data loss is acceptable. It is often identified in a BIA. Compare

G

with RTO.

RSA—Rivest, Shamir, and Adleman. An asymmetric algorithm used to encrypt data and digitally sign transmissions. It is named after its creators, Rivest, Shamir, and Adleman. RSA uses both a

d

public key and a private key in a matched pair.

ie

RSTP—Rapid Spanning Tree Protocol. An improvement over STP. STP and RSTP protocols are enabled on most switches and protect against switching loops, such as those caused when two ports

er tif

of a switch are connected together.

RTO—Recovery time objective. The maximum amount of time it should take to restore a system after an outage. It is derived from the maximum allowable outage time identified in the BIA. Compare with RPO.

C

RTOS—Real-time operating system. An operating system that reacts to input within a specific time. Many embedded systems include an RTOS.

et

S

G

SaaS—Software as a Service. A cloud computing model. SaaS provides applications over the Internet, such as webmail. The vendor is responsible for keeping the SaaS applications available and up-to-date. Compare with IaaS, PaaS and XaaS.

Copyright 2021 YCDA, LLC

SAML—Security Assertions Markup Language. An XML-based standard used to exchange authentication and authorization information between different parties. SAML provides SSO for web-based applications. SAN—Storage Area Network. A specialized network of high-speed storage devices.

d

SCADA—Supervisory control and data acquisition. A system used to control an ICS such as a

ea

power plant or water treatment facility. Ideally, a SCADA is within an isolated network without

direct access to the Internet. NIPS systems and VLANs provide a layer of protection for SCADA systems. Compare with ICS.

Ah

SCP—Secure Copy. Based on SSH, SCP allows users to copy encrypted files over a network. SCP uses TCP port 22.

SDN—Software defined network. A method of using software and virtualization technologies to replace hardware routers. SDNs separate the data and control planes.

et

SDV—Software-defined visibility. Technologies used to view all network traffic. SDV technologies ensure that all cloud-based traffic is viewable and can be analyzed.

G

SED—Self-encrypting drive. A drive that includes the hardware and software necessary to encrypt a hard drive. SEDs include all the encryption circuitry built into the drive, and they automatically encrypt the drive without user action. Users typically enter credentials to decrypt and use the drive.

d

Compare with FDE.

ie

SELinux—Security-Enhanced Linux. An operating system platform that prevents malicious or suspicious code from executing on both Linux and Unix systems. It is one of the few operating

er tif

systems that use the MAC model. Enforcing mode will enforce the SELinux policy and ignore permissions. Permissive mode does not enforce the SELinux policy but instead logs any access that would normally be blocked. Disabled mode does not enforce the SELinux policy and does not log anything related to the policy.

C

SFTP—SSH File Transfer Protocol. An extension of Secure Shell (SSH) used to encrypt FTP traffic. SFTP transmits data using TCP port 22. SFTP is sometimes referred to as secure FTP.

et

SHA—Secure Hash Algorithm. A hashing function used to provide integrity. Versions include SHA-1, SHA-2, and SHA-3. SHA-1 is no longer approved for most cryptographic uses due to

G

weaknesses. SHA-2 has four versions (Sha-256, SHA-512, SHA-224, and SHA-384). SHA-3 (previously known as Keccak) was selected as the next version after a public competition. shadow IT—Shadow information technology. Shadow IT refers to unauthorized systems or applications installed on a network. Users sometimes install systems without approval, often to bypass security controls. Shadow IT increases risks because these systems aren’t managed.

Security+ (SY0-601) Practice Questions https://gcgapremiumpass.com/sy0-601-practice-test-questions/

SIEM—Security information and event management. A system that provides a centralized solution for collecting, analyzing, and managing log data from multiple sources. Log collectors send logs to the SIEM system, and it aggregates the logs. SIM—Subscriber Identity Module. A small card that contains programming and information for

d

mobile devices such, as cell phones. The SIM card identifies what countries or networks the device

ea

will use.

SLA—Service level agreement. An agreement between a company and a vendor that stipulates

performance expectations, such as minimum uptime and maximum downtime levels. Organizations

Ah

use SLAs when contracting services from service providers such as Internet Service Providers (ISPs).

SLE—Single loss expectancy. The monetary value of any single loss. It is used to measure risk with ALE and ARO in a quantitative risk assessment. The calculation is SLE × ARO = ALE. Compare

et

with ALE and ARO.

S/MIME—Secure/Multipurpose Internet Mail Extensions. Used to secure email. S/MIME provides

G

confidentiality, integrity, authentication, and non-repudiation. It can digitally sign and encrypt email, including the encryption of email at rest and in transit. It uses RSA, with public and private keys for encryption and decryption, and depends on a PKI for certificates.

d

SMS—Short Message Service. A basic text messaging service. Most mobile devices support SMS.

ie

Compare with Multimedia Message Service and Rich Communication Services. SMTP—Simple Mail Transfer Protocol. Used to transfer email between clients and servers and

er tif

between email servers and other email servers. SMTP uses TCP port 25. SNMPv3—Simple Network Management Protocol. Used to manage and monitor network devices such as routers or switches. SNMP agents report information via notifications known as SNMP traps or SNMP device traps. SNMP uses UDP ports 161 and 162.

C

SOAR—Secure Orchestration, Automation, and Response. Tools used to automatically respond to low-level security events. Runbooks are the checklists used to create the automated responses and

et

playbooks are the automated actions created from the runbooks. Compare with playbooks and runbooks.

G

SoC—System on chip. An integrated circuit that includes a computing system within the hardware. Many mobile devices include an SoC. SPIM—Spam over Internet Messaging. A form of spam using instant messaging. SPIM targets instant messaging users.

Copyright 2021 YCDA, LLC

SPOF—Single point of failure. Any component whose failure results in the failure of an entire system. Elements such as RAID, failover clustering, UPS, and generators remove many single points of failure. SQL—Structured Query Language. Used by SQL-based databases, such as Microsoft SQL Server.

d

Websites integrated with a SQL database are subject to SQL injection attacks. Input validation with

ea

forms and stored procedures help prevent SQL injection attacks. Microsoft SQL Server uses TCP port 1433 by default.

SRTP—Secure Real-time Transport Protocol. A protocol used to encrypt and provide authentication

Ah

for Real-time Transport Protocol (RTP) traffic. RTP is used for audio/video streaming.

SSD—Solid state drive. A drive used in place of a traditional hard drive. An SSD has no moving parts but instead stores the contents as nonvolatile memory. SSDs are much quicker than traditional hard drives.

et

SSH—Secure Shell. A protocol used to encrypt network traffic. SSH encrypts a wide variety of traffic such as SCP, SFTP, Telnet, and TCP Wrappers. SSH uses TCP port 22. SSH is a more secure

G

alternative than Telnet when connecting to remote servers.

SSID—Service Set Identifier. The name of a wireless network. SSIDs can be set to broadcast so users can easily see the SSID. Disabling SSID broadcast hides it from casual users, but an attacker can discover it

d

with a wireless sniffer. It’s recommended to change the SSID from the default name .

ie

SSL—Secure Sockets Layer. The predecessor to TLS. SSL was used to encrypt data in transit with the use of certificates but is deprecated now.

er tif

SSO—Single sign-on. Authentication method where users can access multiple resources on a network using a single account. SSO can provide central authentication against a federated database for different operating systems.

STP—Spanning Tree Protocol. Protocol enabled on most switches that protects against switching

C

loops. A switching loop is caused when two ports of a switch are connected together. SYN—Synchronize. The first packet in a TCP handshake. In a SYN flood attack, attackers send this

et

packet, but don’t complete the handshake after receiving the SYN/ACK packet. system on chip (SoC)—An integrated circuit that includes a computing system within the hardware.

G

Many mobile devices include an SoC.

Pass the First Time with Quality Practice Test Questions https://gcgapremium.com/sy0-601-practice-test-questions/

Security+ (SY0-601) Practice Questions https://gcgapremiumpass.com/sy0-601-practice-test-questions/

T TACACS+—Terminal Access Controller Access-Control System+. Provides central authentication for remote access clients and used as an alternative to RADIUS. TACACS+ uses TCP port 49. It

the password. It uses multiple challenges and responses. Compare with RADIUS.

d

encrypts the entire authentication process, compared with the default RADIUS, which only encrypts

TCO attempts to identify the cost of a product or service over its lifetime.

ea

TCO—Total cost of ownership. A factor considered when purchasing new products and services.

Ah

TCP—Transmission Control Protocol. Provides guaranteed delivery of IP traffic using a three-way handshake. Compare with UDP.

TCP/IP—Transmission Control Protocol/Internet Protocol. Represents the full suite of protocols used on the Internet and most internal networks.

et

TFTP—Trivial File Transfer Protocol. Used to transfer small amounts of data with UDP port 69. In contrast, FTP is used to transfer larger files using TCP ports 20 and 21.

tickets that expire after a certain time period.

G

TGT—Ticket Granting Ticket. Used with Kerberos. A KDC (or TGT server) issues timestamped

TLS—Transport Layer Security. Used to encrypt data in transit. TLS is the replacement for SSL and

d

like SSL, it uses certificates issued by CAs. HTTPS uses TLS to encrypt web sessions. VPNs can

ie

use TLS to encrypt VPN sessions. Several authentication protocols (such as PEAP, EAP-TLS, EAPTTLS) use TLS to encrypt the authentication process. TLS requires a CA to issue certificates.

er tif

TOTP—Time-based One-Time Password. An open standard used for creating one-time passwords, TOTP is similar to HOTP, but it uses a timestamp instead of a counter. One-time passwords created with TOTP expire after 30 seconds. Compare with HOTP. TPM—Trusted Platform Module. A hardware chip on the motherboard included on many newer

C

laptops. A TPM includes a unique RSA asymmetric key, and when first used, creates a storage root key. TPMs generate and store other keys used for encryption, decryption, and authentication. TPM

et

provides full disk encryption. Compare with HSM.

G

U

UAVs—Unmanned aerial vehicles. Flying vehicles piloted by remote control or onboard computers. UDP—User Datagram Protocol. Used instead of TCP when guaranteed delivery of each packet is not necessary. UDP uses a best-effort delivery mechanism. Compare with TCP.

Copyright 2021 YCDA, LLC

UEFI—Unified Extensible Firmware Interface. A method used to boot some systems and intended to replace Basic Input/Output System (BIOS) firmware. Compare with BIOS. UPS—Uninterruptible power supply. A battery backup system that provides fault tolerance for power and can protect against power fluctuations. A UPS provides short-term power to give the system enough time

d

to shut down smoothly or transfer to generator power. Generators provide long-term power in extended

ea

outages.

URI—Uniform Resource Identifier. Used to identify the name of a resource and always includes the protocol such as http://GetCertifiedGetAhead.com.

Ah

URL—Uniform Resource Locator. A type of URI. Address used to access web resources, such as http://GetCertifiedGetAhead.com. Pop-up blockers can include URLs of sites where pop-ups are allowed.

URL hijacking— Uniform Resource Locator hijacking. The purchase of a domain name that is

et

close to a legitimate domain name. Attackers often try to trick users who inadvertently use the wrong domain name. Also called typo squatting.

G

URL redirection—Uniform Resource Locator redirection. A technique used to redirect traffic to a different page or a different site.

USB—Universal Serial Bus. A serial connection used to connect peripherals such as printers, flash

d

drives, and external hard disk drives. Data on USB drives can be protected against loss of

ie

confidentiality with encryption. Attackers have spread malware through Trojans. USB On-The-Go (OTG). A cable used to connect mobile devices to other devices. It is one of many

er tif

methods that you can use to connect a mobile device to external media. UTM—Unified threat management. A security appliance that combines multiple security controls into a single solution. UTM appliances can inspect data streams for malicious content and often

V

C

include URL filtering, malware inspection, and content inspection components.

et

VDI—Virtualization Desktop Infrastructure. Virtualization software designed to reproduce a desktop operating system as a virtual machine on a remote server. Users can access VDI desktops

G

from desktop PCs or mobile devices. VLAN—Virtual local area network. A method of segmenting traffic. A VLAN can logically group several different computers together, or logically separate computers without regard to their physical location. It is possible to create multiple VLANs with a single switch. You can also create VLANs with virtual switches.

Security+ (SY0-601) Practice Questions https://gcgapremiumpass.com/sy0-601-practice-test-questions/

VM—Virtual machine. A virtual system hosted on a physical system. A physical server can host multiple VMs as servers. Virtualization helps reduce the amount of physical equipment required, reducing overall physical security requirements such as HVAC and power. VM escape—Virtual machine escape. An attack that allows an attacker to access the host system

d

from within a virtual machine. The primary protection is to keep hosts and guests up to date with

ea

current patches. Compare with virtual machine sprawl.

VM sprawl—Virtual machine sprawl. A vulnerability that occurs when an organization has VMs that aren’t properly managed. Unmanaged VMs are not kept up to date with current patches.

Ah

Compare with virtual machine escape.

VoIP—Voice over IP. A group of technologies used to transmit voice over IP networks. Vishing is a form of phishing that sometimes uses VoIP.

VPN—Virtual private network. Provides access to a private network over a public network such as

et

the Internet. VPNs can provide access to internal networks for remote clients, or provide access to

G

other networks via site-to-site VPNs.

W

d

WAF—Web application firewall—A firewall specifically designed to protect a web application. A

ie

WAF inspects the contents of traffic to a web server, can detect malicious content such as code used in a cross-scripting attack, and block it.

er tif

WAP—Wireless access point. A device that connects wireless clients to wireless networks. Sometimes called an access point (AP).

WPA—WiFi Protected Access. A legacy wireless security protocol. WPA2 and WPA3 have superseded WPA.

C

WPA2—WiFi Protected Access 2. Security protocol used to protect wireless transmissions. It supports CCMP for encryption, which is based on AES. It uses an 802.1X server for authentication in WPA2 Enterprise mode and a preshared key for WPA2 Personal mode, also called WPA2-PSK.

et

WPA3—WiFi Protected Access 3. Security protocol used to protect wireless transmissions. WPA3 is the newest wireless cryptographic protocol. It uses Simultaneous Authentication of Equals (SAE) instead of

G

the PSK used with WPA2. SAE is based on the Diffie–Hellman key exchange. WPS—WiFi Protected Setup. Allowed users to easily configure a wireless network, often by using only a PIN. WPS brute force attacks can discover the PIN when used with WPA2. WPS attack—An attack against an AP. A WiFi Protected Setup (WPS) attack discovers the eightdigit WPS PIN and uses it to discover the AP passphrase. WPA3 is resistant to WPS attacks.

Copyright 2021 YCDA, LLC

Pass the First Time with Quality Practice Test Questions https://gcgapremium.com/sy0-601-practice-test-questions/

d

X

ea

XaaS—Anything as a Service. A cloud computing model. XaaS refers to any cloud computing model not identified in IaaS, PaaS, or SaaS models. Compare to IaaS, PaaS, and SaaS.

exporting data. XML uses formatting rules to describe the data.

Ah

XML—Extensible Markup Language. A language used by many databases for inputting or

XSRF—Cross-site request forgery. A web application attack. Attackers use XSRF attacks to trick users into performing actions on websites, such as making purchases, without their knowledge. In

et

some cases, it allows an attacker to steal cookies and harvest passwords.

XSS—Cross-site scripting. A web application vulnerability that allows attackers to inject scripts into

G

webpages. Attackers use XSS to capture user information such as cookies. Input validation techniques on the server-side help prevent XSS attacks by blocking HTML and JavaScript tags.

G

et

C

er tif

ie

Version 0.1 May 11 2021

d

Many sites prevent the use of < and > characters to block cross-site scripting.

Security+ (SY0-601) Practice Questions https://gcgapremiumpass.com/sy0-601-practice-test-questions/