100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CompTIA Security+ (SY0-601). $7.99   Add to cart

Exam (elaborations)

CompTIA Security+ (SY0-601).

 1 view  0 purchase
  • Course
  • Institution

CompTIA Security+ (SY0-601).

Preview 2 out of 14  pages

  • July 12, 2024
  • 14
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
CompTIA Security+ (SY0-601)
Access Protocol (LDAP) - ANS-A software protocol that enables an entity to look up data stored
in a server.

Address Resolution Protocol (ARP) - ANS-A communication protocol used for finding the link
layer address, such as a MAC address, associated with a given internet layer address.

Advanced persistent threat (APT) - ANS-An attack in which an unauthorized user gains access
to a system or network and remains there for an extended period of time without being detected.

Air gap - ANS-A network security measure employed on one or more computers to ensure that
a secure computer network is physically isolated from unsecured networks.

Antivirus - ANS-A software designed to prevent, detect and remove malware infections on
individual computing devices, networks and IT systems.

Anything as a service (XaaS) - ANS-Describes a general category of services related to cloud
computing and remote access.

API considerations - ANS-An overarching term referring to practices and products that prevent
malicious attacks on, or misuse of, Application Program Interfaces (API).

Arduino - ANS-An open-source electronics platform based on easy-to-use hardware and
software.

Authentication Header (AH) - ANS-A security mechanism used in authenticating the origins of
datagrams.

Authority - ANS-The power to enforce rules or give orders.

Automated Indicator Sharing (AIS) - ANS-Enables the exchange of cyber threat indicators, at
machine speed, among the Federal Government.

Backdoor - ANS-A means to access a computer system or encrypted data that bypasses the
system's customary security.

Birthday - ANS-A type of cryptographic attack, which exploits the mathematics behind the
birthday problem in probability theory.

Blockchain - ANS-A growing list of records, called blocks, that are linked using cryptography.

, Blue-team - ANS-Defensive security professionals responsible for maintaining internal network
defenses against all cyber attacks and threats.

Bluejacking - ANS-The sending of unsolicited messages over Bluetooth to Bluetooth-enabled
devices.

Bluesnarfing - ANS-The unauthorized access of information from a wireless device through a
Bluetooth connection.

Bots - ANS-A network of computers infected by malware that are under the control of a single
attacking party, known as the "bot-herder."

Brute force - ANS-A brute-force technique where attackers run through common words and
phrases, such as those from a dictionary, to guess passwords.

Buffer overflows - ANS-When the volume of data exceeds the storage capacity of the memory
buffer.

Bug bounty - ANS-A deal offered by many websites, organizations and software developers by
which individuals can receive recognition and compensation for reporting bugs.

Card cloning - ANS-The practice of making an unauthorized copy of a credit card.

Cipher suites - ANS-A set of algorithms that help secure a network connection that uses
Transport Layer Security (TLS).

client-side - ANS-Refers to operations that are performed by the client in a client-server
relationship in a computer network.

Code reuse - ANS-The use of existing software, or software knowledge, to build new software,
following the reusability principles.

Cold aisle - ANS-A layout design especially for data warehouses where huge servers and
computing equipment are kept and data is stored.

Cold site - ANS-A backup facility with little or no hardware equipment installed.

Collision Attack - ANS-An attack on a cryptographic hash to find two inputs producing the same
hash value, i.e. a hash collision.

Command and Control - ANS-A computer controlled by a cybercriminal to send commands to
systems compromised by malware and receive stolen data from a target network.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller lydiaomutho. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

62890 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart