Information Technology /Security+ (SY0-701): Cert Master Practice; 1.0 General Security Concepts

Security+ (SY0-701): Cert Master Practice; 1.0 General Security Concepts

Information Technology6 CardsCreated about 2 months ago

This flashcard deck covers key concepts from the Security+ (SY0-701) exam, focusing on general security concepts such as technical and operational controls, policy enforcement, and tokenization.

Define a ‘technical control’

Hardware or software mechanisms used to protect assets. Additionally, antivirus software, firewalls, and intrusion detection systems are examples of technical controls.
Tap or swipe ↕ to flip
Swipe ←→Navigate
SSpeak
FFocus
1/6

Key Terms

Term
Definition
Define a ‘technical control’
Hardware or software mechanisms used to protect assets. Additionally, antivirus software, firewalls, and intrusion detection systems are examples of t...
Define an ‘operational control’
Controls that involve actions, such as adhering to security policies and procedures to enhance user behavior while mitigating security risks.
What mechanism can be implemented to grant permissions based on the users role?
Policy enforcement points
Define a ‘Policy enforcement point’
Enforces decisions about whether to grant access to a requested resource or not.
What type of sensors do motion detectors use?
Infrared sensors.
Define ‘tokenization’
Replacing all or part of a value with a randomly generated token.

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition
Define a ‘technical control’
Hardware or software mechanisms used to protect assets. Additionally, antivirus software, firewalls, and intrusion detection systems are examples of technical controls.
Define an ‘operational control’
Controls that involve actions, such as adhering to security policies and procedures to enhance user behavior while mitigating security risks.
What mechanism can be implemented to grant permissions based on the users role?
Policy enforcement points
Define a ‘Policy enforcement point’
Enforces decisions about whether to grant access to a requested resource or not.
What type of sensors do motion detectors use?
Infrared sensors.
Define ‘tokenization’
Replacing all or part of a value with a randomly generated token.