COMPTIA SECURITY+ 701 EXAM STUDY
GUIDE QUESTIONS AND VERIFIED ANSWERS
CIA triad (Confidentiality, Integrity, Availability)
AAA Of Security
Authentication, Authorization, and Accounting
Checksums
Method to verify the integrity of data during transmission
Digital Signatures
Ensure Both Integrity of data during transaction
Server Redundancy
Involves using multiple servers in a load balanced or failover configuration so
that if one is overloaded or fails, the other servers can take over the load to
continue supporting your end users
Network Redundancy
Ensures that if one network path fails, the data can travel through another route
data redundancy
involves storing data in multiple places
Power Redundancy
involves using backup power sources, like generators and ups systems
Non-repudiation
provides undeniable proof in the world of digital transactions. Cant deny
participation or authenticity of their actions
, Syslog servers
used to aggregate logs from various network devices and systems so that system
administrators can analyze them to detect patterns or anomalies in the
organizations systems
Technical Controls
"technology", hardware, and software mechanisms that are implemented to
manage and reduce risks
Managerial Controls
("Managing" things) also referred to administrative controls, involve the
strategic planning and governance side of security
Operational Controls
Procedures and measures that are designed to protect data on a day to day basis.
Are mainly governed by internal processes and human actions
Preventive
Proactive measures implemented to thwart potentical security threats or
breaches
Deterrent Controls
Discourage potential attackers by making the effort seem less appealing or more
challenging
Detective Controls
(detect) Monitor and alert organizations to malicious activities as they occur
Corrective Controls
Mitigate any potential damage and restore our systems to their normal state
Compensating Controls
Alternative measures that are implemented when primary security controls are
not feasible or effective
Directive Controls
Guide, inform, or mandate actions. Often rooted in Policy.
GUIDE QUESTIONS AND VERIFIED ANSWERS
CIA triad (Confidentiality, Integrity, Availability)
AAA Of Security
Authentication, Authorization, and Accounting
Checksums
Method to verify the integrity of data during transmission
Digital Signatures
Ensure Both Integrity of data during transaction
Server Redundancy
Involves using multiple servers in a load balanced or failover configuration so
that if one is overloaded or fails, the other servers can take over the load to
continue supporting your end users
Network Redundancy
Ensures that if one network path fails, the data can travel through another route
data redundancy
involves storing data in multiple places
Power Redundancy
involves using backup power sources, like generators and ups systems
Non-repudiation
provides undeniable proof in the world of digital transactions. Cant deny
participation or authenticity of their actions
, Syslog servers
used to aggregate logs from various network devices and systems so that system
administrators can analyze them to detect patterns or anomalies in the
organizations systems
Technical Controls
"technology", hardware, and software mechanisms that are implemented to
manage and reduce risks
Managerial Controls
("Managing" things) also referred to administrative controls, involve the
strategic planning and governance side of security
Operational Controls
Procedures and measures that are designed to protect data on a day to day basis.
Are mainly governed by internal processes and human actions
Preventive
Proactive measures implemented to thwart potentical security threats or
breaches
Deterrent Controls
Discourage potential attackers by making the effort seem less appealing or more
challenging
Detective Controls
(detect) Monitor and alert organizations to malicious activities as they occur
Corrective Controls
Mitigate any potential damage and restore our systems to their normal state
Compensating Controls
Alternative measures that are implemented when primary security controls are
not feasible or effective
Directive Controls
Guide, inform, or mandate actions. Often rooted in Policy.