Bash, the Crucial Exams Chat Bot
AI Bot
Security Concepts Flashcards
CompTIA ITF+ FC0-U61 (V5) Flashcards
Study our Security Concepts flashcards for the CompTIA ITF+ FC0-U61 (V5) exam with 20+ flashcards. View as flashcards, a searchable table, or as a fun matching game.

| Front | Back |
| Name a simple countermeasure to protect data transmissions over networks | Use strong encryption protocols |
| Name a type of software designed to gain unauthorized access and steal information | Malware |
| What do we call a software flaw that malicious actors exploit? | Vulnerability |
| What do we call a test that identifies potential vulnerabilities in a system? | Penetration test |
| What does the C in CIA stand for? | Confidentiality |
| What is a malicious program that can replicate itself without user intervention? | Worm |
| What is a secret phrase or sequence used to protect accounts or data? | Password |
| What is the practice of converting information into an unreadable format? | Encryption |
| What is the process of dividing a network into smaller distinct subnetworks? | Network segmentation |
| What is the term for a potential danger that could exploit a vulnerability? | Threat |
| What method checks data integrity by detecting unauthorized changes? | Hashing |
| What principle ensures users have only the minimum access required? | Least privilege |
| What security measure verifies the identity of a user or device? | Authentication |
| Which concept involves ensuring data can be traced to its originator? | Non-repudiation |
| Which concept is about controlling actions allowed to a user or device? | Authorization |
| Which principle ensures data is accurate and unaltered? | Integrity |
| Which principle ensures systems are accessible when needed? | Availability |
| Which type of attack uses deception to trick users? | Social engineering |
| Which type of malware disguises itself as legitimate software? | Trojan horse |
| Which type of security measure records and analyzes system events? | Logging and monitoring |