Comptia Certmaster Ce Security+ Details
66 community-sourced questions and answers. Free — no login.
A firewall
any software or hardware device that protects a system or network by blocking unwanted network traffic. Firewalls generally are configured to stop suspicious or unsolicited incoming traffic through a process called implicit deny.
A stateful firewall
A stateful firewall does track the active state of a connection and is able to make decisions based on the contents of a network packet as it relates to the state of the connection.
stateless firewall
does not track the active state of a connection as it reaches the firewall. It allows or blocks traffic based on some static value associated with that traffic.
An access control list (ACL)
a list of objects with permissions attached to those objects. The list specifies which entities (such as individuals) have the rights to access specific resources and to what extent those resources may be modified (if at all).
Implicit deny
The principle that establishes that everything that is not explicitly allowed is denied.
A VPN concentrator
A single device that incorporates advanced encryption and authentication methods in order to handle a large number of VPN tunnels.
Remote access vs. site-to-site
A remote access VPN connects individual remote users to the private network, whereas a site-to-site VPN connects two private networks together.
Internet Protocol Security (IPSec)
an open-source protocol framework for security development within the TCP/IP family of protocol standards. IPSec is not application dependent as it operates at the network layer (layer 3) of the OSI model.
IPSec transport mode
IPSec encrypts just the IP payload, leaving the IP packet header unchanged so it can be easily routed through the internet
IPSec tunnel mode
both the packet contents and header are encrypted.
IPSec, Authentication Header (AH)
One of the two protocols used in IPSec, Authentication Header (AH) provides authentication for the origin of transmitted data as well as integrity and protection against replay attacks.
IPSec, Encapsulation Security Payload (ESP)
One of the two protocols used in IPSec, provides the same functionality as Authentication Header (AH), with the addition of encryption to support the confidentiality of transmitted data.
Split tunnel vs. full tunnel
When a device is connected to the VPN in full tunnel mode, all network traffic is sent through the tunnel and encrypted. In split mode, only some of the traffic is sent through the tunnel and encrypted.
TLS/SSL (Transport Layer Security and Secure Sockets Layer)
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are security protocols that combine digital certificates for authentication with public key data encryption.
Always-on VPN
Some VPN concentrators support an always-on capability so that the user's device will automatically connect to the VPN any time it has an Internet connection.
NIPS (network-based intrusion prevention system)
A network intrusion prevention system (NIPS) monitors suspicious traffic on the network and reacts in real time to block it.
NIDS (network-based intrusion detection system)
A NIDS primarily uses passive hardware sensors to monitor traffic on a specific segment of the network. It can sniff traffic and send alerts about anomalies or concerns.
NIPS Signature-based monitoring
Signature-based monitoring uses a predefined set of rules provided by a software vendor or security personnel to identify events that are unacceptable.
NIPS Heuristic/Behavioral monitoring
identifies the way in which an entity acts in a specific environment, and makes decisions about the nature of the entity based on this. Behavior-based monitoring identifies the way in which an entity acts, and then reviews future behavior to see if it deviates from the norm.
NIPS Anomaly-based monitoring
uses a definition of an expected outcome or pattern to events, and then identifies any events that do not follow these patterns. Events that sufficiently deviate from the preconfigured baseline of acceptable events may be identified as anomalous.
Inline vs. passive (in-band vs. out-of-band)
Inline (in-band) monitoring sensors are placed within a network segment so traffic must pass through the monitoring system before it reaches its destination. This allows the system to immediately block suspicious traffic. Passive or out-of-band sensors only receive a copy of the traffic.
NIPS Signature-based monitoring rules
Rules are conditions by which a system can identify abnormal operation. In signature-based monitoring, rules are provided by a software vendor or by security personnel to identify events that are unacceptable.
Analytics
sets of data provided by systems like IDSs/IPSs that help security administrators identify trends and patterns of a device or a system's operation. Analytics are often provided in the form of logs or in graphical user interfaces (GUIs) for easier interpretation.
False negative
occurs when a tool identifies something as not being a vulnerability, when it actually is one. This may lead to issues that go undiscovered for a long time and is considered a catastrophic failure on the part of the scanning tool.
Router
A device that transfers data from one network to another in an intelligent way
Network Switch
a device that has multiple network ports and combines multiple physical network segments into a single logical network. It controls network traffic on the logical network by creating dedicated, or switched, connections that contain only the two hosts involved in a transmission.
Port security
Switches can enforce port security by limiting the unique hardware that is allowed to receive communications on a particular port.
Layer 2 functionality
allows standard switches to forward broadcasts to all ports on the switch, but will send individual packets to the specific destination host based on the unique physical address assigned to each network adapter.
Layer 3 functionality
allows switches to perform routing functions based on protocol addresses.
Switch Loop Prevention
Switches can also implement loop prevention (where traffic is bouncing back and forth between multiple switches connected to each other) by shutting down network access on ports where loops are detected.
Switch flood guard
Switches may also have flood guards that protect hosts on the switch against SYN flood and ping flood DoS attacks.
Proxy
a device that acts on behalf of one end of a network connection when communicating with the other end of the connection. Proxies are often used as a method of content filtering.
Forward Proxy
Proxy used to forward outgoing requests from a private network or intranet to the Internet, usually through a firewall.
reverse proxy
A device that routes incoming requests to the correct server.
Transparent Proxy
A proxy that does not require any configuration on the user's computer.
Application/multipurpose proxy
A special proxy that "knows" the application protocols that it supports. For example, an FTP proxy server implements the protocol FTP.
Load balancer
A dedicated network device that can direct requests to different servers based on a variety of factors.
Round Robin Scheduling
Works from top to bottom of list directing traffic to the next device.
affinity scheduling
A scheduling policy where tasks are preferentially scheduled onto the same processor they had previously been assigned. intended to reduce the number of open network connections between clients and servers.
Active-passive load balance mode
one load balancer handles the primary workload, while another load balancer is on standby. If the primary load balancer fails, the load balancer on standby takes over and becomes active.
Active-active load balance mode
both load balancers take on equal portions of the workload. If one load balancer fails, the other will keep on providing service.
Virtual IP address
An IP address that can be shared by a group of routers. Do not have a physical network interface
SSID
Service Set Identifier, can be disabled but isn''t a reliable security feature
Access point security
disabling service set identifier broadcast (SSID), MAC filtering, signal configuration and deciding between fat versus thin access points.
MAC filtering
A method of controlling access on a wired or wireless network by denying access to an device that their MAC address does not match one that is on a pre-approved list. easily spoofed
Signal strength
Adjusting the strength of wireless signals can help contain the range of your network.
Band selection/width
5 GHz frequency offers greater bandwidth 2.4 GHz frequency offers a larger range and can more easily penetrate solid objects like walls.
Directional antennas
Yagi, Parabolic, Backfire and Cantenna Directional antennas transmit signals to a specific point. Have large gain, meaning reliable connection range and power
Omni-directional antennas
Rubber Ducky, ceiling dome send and receive radio waves from all directions, usually as the main distribution source of a wireless signal
Fat vs. thin access points
An access point with limited functionality. (It does not provide authentication or encryption.) Requires additional devices to be secure
thin access point
Intelligent wireless access point that provides everything needed to manage wireless clients. Need to be configured individually.
Fat Access Point
Wireless access point that depends on and connects to WLAN controller to configure wireless security settings. Thin APs
Controller-based Access Point
An AP that includes everything needed to connect wireless clients to a wireless network. This must be configured independently. Sometimes called a stand-alone AP. Compare with thin AP.
Fat AP
A two-part process consisting of security event monitoring (SEM), which performs real-time monitoring of security events, and security information management (SIM), where the monitoring log files are reviewed and analyzed by automated and human interpreters.
Security Information and Event Management (SIEM)
A SIEM feature that can show the order of the events.
SIEM time synchronization
To help uphold the integrity of security data, systems that push data to a SIEM can store log files on a Write once read many (WORM) storage medium. This ensures that once data is written, it cannot be modified—only read (in this case, by the SIEM).
Logs/WORM
software solution that detects and prevents sensitive information in a system or network from being stolen or otherwise falling into the wrong hands.
Data Loss/Leak Prevention (DLP)
The set of standards defined by the network for clients attempting to access it. Usually, NAC requires that clients be virus free and adhere to specified policies before allowing them on the network.
Network Access Control (NAC)
Software agents can further be classified as either permanent or dissolvable. A permanent agent stays on the device indefinitely—a dissolvable agent is removed once the device is authenticated.
Dissolvable vs. permanent NAC agent
Agent software agents must be installed on the devices that request access for the NAC to carry out its health checks. Agentless NACs use network scanning and analysis techniques to ascertain health information, without devices requiring specific software.
Agent vs. agentless NAC
This device or server is placed in the DMZ and sends out or receives e-mail for the organization. It does a virus scan and spam filter check to ensure it is a valid message.
Mail gateway
A network device similar to a switch. The main difference is that a bridge has a single port for incoming traffic and a single port for outgoing traffic. Bridges are less ideal for high-speed and high-load networks.
Bridge
SSL/TLS accelerators can offload the resource-intensive encryption calculations in SSL/TLS to reduce overhead for the server.
SSL/TLS accelerators
SSL/TLS decryptors solve this issue by decrypting traffic and then forwarding the plaintext traffic to the relevant security device for analysis.
SSL decryptors
which translate streaming media between different types of networks, may contain voice communications or intellectual property that the organization wants to keep secure.
Media gateway
A physical device that deals with the encryption of authentication processes, digital signings, and payment processes.
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials