Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CompTIA Security+ SY0-701 – Flashcards by Jeff Chaplin – Complete Exam Prep Set

Rating
-
Sold
-
Pages
19
Grade
A+
Uploaded on
23-07-2025
Written in
2024/2025

Preventive Controls - correct answer Objective: Prevent security incidents from occurring. Examples: Firewalls, Access control mechanisms (e.g., passwords, biometrics) Intrusion prevention systems (IPS), Security policies and procedures Deterrent Controls - correct answer Objective: Discourage potential attackers from attempting to compromise a system. Examples: Warning signs, Security awareness training, Visible security measures (e.g., security guards, CCTV) Detective Controls - correct answer Objective: Detect and alert on security incidents as they occur. Examples: Intrusion detection systems (IDS)

Show more Read less
Institution
CompTIA Security+ SY0-701
Course
CompTIA Security+ SY0-701

Content preview

CompTIA Security+ SY0-701 Flashcards - Created By Jeff Chaplin
Preventive Controls - correct answer Objective: Prevent security incidents from occurring.
Examples: Firewalls, Access control mechanisms (e.g., passwords, biometrics) Intrusion
prevention systems (IPS), Security policies and procedures
Deterrent Controls - correct answer Objective: Discourage potential attackers from attempting
to compromise a system. Examples: Warning signs, Security awareness training, Visible security
measures (e.g., security guards, CCTV)
Detective Controls - correct answer Objective: Detect and alert on security incidents as they
occur. Examples: Intrusion detection systems (IDS), Security information and event
management (SIEM) systems, Audit logs and monitoring, Surveillance cameras
Corrective Controls - correct answer Objective: Correct and mitigate the impact of security
incidents. Examples: Antivirus and anti-malware software, Backup and recovery procedures,
Patch management systems, Incident response plans
Compensating Controls - correct answer Compensating controls are security measures
implemented to provide an alternative method of protecting assets when standard controls are
not feasible. Examples: Temporary access restrictions, Alternative authentication mechanisms,
Additional monitoring when primary controls are down
Directive Controls - correct answer Objective: Specify acceptable practices and expected
behavior. Examples: Security policies and guidelines, Employee handbooks, Standard operating
procedures (SOPs), Codes of conduct
Define the Five Core principles of Information Security (CIANA) - correct answer Confidentiality,
Integrity, Availability, Non-Repudiation, Authentication
Gap Analysis Steps - correct answer Define the scope, Gather data about the current
infrastructure, Analyze the data and identify the gaps, Develop a plan to bridge the gap
Honeypot - correct answer A honeypot is a decoy system or resource designed to attract and
deceive attackers. It appears to be a legitimate part of the network but is isolated and
monitored to gather information about attackers' tactics, techniques, and motives.
Honeynet - correct answer A honeynet is a network of honeypots that are interconnected to
simulate a larger and more realistic environment for attracting and monitoring attackers. It
allows organizations to capture and analyze broader attack patterns and behaviors.
Honeyfile - correct answer A honeyfile is a file or document that is intentionally created and
placed in a network to act as bait for attackers. It contains seemingly valuable information that,
if accessed or modified, triggers alerts and provides insights into unauthorized access attempts.

,Honeytoken - correct answer A honeytoken is a piece of data or credential that is intentionally
placed within an information system to serve as a decoy or indicator of unauthorized access. If
a honeytoken is accessed or used, it alerts security teams to potential security breaches.
Non-Repudiation - correct answer A security principle ensuring that a party in a communication
cannot deny the authenticity of their signature on a document or the sending of a message that
they originated. This is typically achieved through the use of cryptographic methods, such as
digital signatures and public key infrastructure (PKI).
What are the five factors of Authentication - correct answer Knowledge Factor: Something You
Know, Possession Factor: Something You Have, Inherence Factor: Something You Are,
Behavioral Biometrics: Something You Do, Location Factor: Somewhere You Are
PTZ - correct answer Pan-Tilt-Zoom
FRR - correct answer False Rejection Rate - How often a biometric system fails to allow a user
access who should have had access
Chiper Lock - correct answer A Mechanical locking mechanism that uses a mechanical keypad
for entry
Infrared Sensor - correct answer IR sensors can be either active or passive. Active IR sensors
emit infrared light and measure the reflection, while passive IR sensors detect the infrared light
naturally emitted by objects. Used in: Motion Detection, Remote Controls, Thermal Cameras,
Temperature sensors
Microwave Sensor - correct answer A microwave sensor uses microwave radar to detect
objects and motion. These sensors emit microwaves and measure the time it takes for the
waves to be reflected back after hitting an object. Used in: Automatic Doors, Speed Radars,
Occupancy Sensing, Motion sensors
Ultrasonic Sensor - correct answer An ultrasonic sensor uses ultrasonic sound waves to detect
objects and measure distances. The sensor emits sound waves at a high frequency and
measures the time it takes for the echo to return after hitting an object. Used in: Parking
Assistance, Robotics, Industrial Automation
Shadow IT - correct answer A type of threat actor that creates internal threats involving the use
of systems, devices, software, applications, and services that are used within an organization
without explicit approval or knowledge of the organization's IT department.
Name all four Security Controls - correct answer Detective, Compensating, Directive, Corrective
Social Proof - correct answer A psychological and social phenomenon where individuals copy
the actions of others in an attempt to reflect correct behavior for a given situation. This concept
is often exploited in social engineering attacks

, Typosquatting - correct answer "Typosquatting" is a form of cyber-attack where malicious
actors register domain names that are similar to legitimate websites, often differing by a small
typo or misspelling. Example: Real: Facebook.com | Fake: Facebo0k.com
Watering Hole Attack - correct answer A "watering hole attack" is a type of cyber-attack in
which attackers compromise a specific website or set of websites that are frequently visited by
a particular group, organization, or industry. The goal is to infect the visitors of these sites with
malware.
Phishing - correct answer Phishing is a cyber-attack where attackers send fraudulent emails or
messages pretending to be from reputable sources to trick individuals into revealing sensitive
information, such as usernames, passwords, and credit card details.
Spear Phishing - correct answer Spear phishing is a targeted phishing attack aimed at a specific
individual or organization. Attackers gather personal information about their target to craft a
highly personalized and convincing email or message to deceive them into revealing sensitive
information.
Whaling - correct answer Whaling is a type of phishing attack that targets high-profile
individuals, such as executives or senior management, within an organization. The attacker
impersonates a trusted entity to deceive the target into divulging sensitive information or
authorizing significant financial transactions.
Vishing - correct answer Vishing, or voice phishing, involves attackers using phone calls to
impersonate legitimate organizations or individuals to trick victims into providing personal
information, such as credit card numbers or social security numbers.
Smishing - correct answer Smishing, or SMS phishing, involves attackers sending fraudulent text
messages that appear to come from reputable sources. These messages often contain links or
phone numbers that lead to phishing websites or prompt the victim to provide personal
information.
Business Email Compromise (BEC) - correct answer Business Email Compromise (BEC) is a
sophisticated phishing attack where attackers spoof or compromise a legitimate business email
account to deceive employees, partners, or customers into transferring money or sensitive
information. BEC often targets employees with access to company finances or valuable data.
Invoice Scam - correct answer A type of social engineering attack where cybercriminals send
fraudulent invoices to a business or individual, hoping to trick the recipient into making a
payment to the attacker's account.
Baiting - correct answer "Baiting" is a type of social engineering attack where an attacker
entices a victim with a lure, such as a seemingly harmless or appealing object, to trick them into
compromising their security.

Written for

Institution
CompTIA Security+ SY0-701
Course
CompTIA Security+ SY0-701

Document information

Uploaded on
July 23, 2025
Number of pages
19
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$17.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BSNGUIDER California Southern University
Follow You need to be logged in order to follow users or courses
Sold
203
Member since
5 year
Number of followers
174
Documents
4207
Last sold
1 month ago
Simples

4.3

39 reviews

5
25
4
6
3
5
2
2
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions