Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
College aantekeningen

Comptia Security+ Notes

Beoordeling
-
Verkocht
-
Pagina's
316
Geüpload op
03-11-2025
Geschreven in
2025/2026

Noted I wrote down and memorised from dion training to pass my comptia security+ exam.

Instelling
Vak

Voorbeeld van de inhoud

Section 2
3- Fundamentals of security
What is information security?
What is CIA in CIA triad?
What is non-repudiation? And an example

4 – AAA of security
What is Authentication, Authorization and Accounting? And give example for each
What are security controls?
What is zero trust?
What is control plane?
What is data plane?

5 - Threats and vulnerabilities
What is a threat?
What is a vulnerability?



6 - confidentiality
Why confidentiality is important for a business? (2)
What is encryption and how does encryption ensure confidentiality? (1)
How does access controls ensure confidentiality? (1)
What is data masking? And a real-life example how it can ensure confidentiality? (1)
What is physical security measure? And an example of a physical security measure which can help
ensure confidentiality?
how does training and awareness ensure confidentiality?

7 - integrity
Why is integrity important for a business? (3)

What is hashing? And include things like hashing function, digest function and digital fingerprint

How does a digital signature ensure integrity and authenticity?
And how do you digitally sign a file? (include information such as hashing the file, hash
digest, encryption using a private key, changes to hash would invalidate the digital signature
etc)

A checksum is a method to verify integrity of data during what?
How does a checksum work?
Hint( Include information like the sender’s checksum of the transmitted data, receiver’s
calculated checksum for the received data, recipient can compute a new checksum for
received data and compare it to the provided checksum, if the two values match it means
that…, and if the two values don’t match this means alteration or corruption has happened)



Access controls and how they provide integrity?

1

,Regular audit and how they provide integrity?



8 – availability
Why is availability important to a business? (3)

What is redundancy?

What is server redundancy?

What is data redundancy?

What is network redundancy?

What is power redundancy?



9 – Non-repudiation
Advantage of non-repudiation? (individuals and entities in a communication cannot deny..)
How is a digital signature created? (Hashing a message, encrypting the hash digest with the
user’s private key using asymmetric encryption)
Example of how digital signature can be used? (emails)
Non-reputation is important for which reasons? (3 – Authenticity of digital transactions, integrity
of critical communications, providing accountability in digital processes)




10 – Authentication
What is authentication?
Authentication methods – something you know, something you have, something you are, something
you do, and somewhere you are (5)
What is MFA (Multi factor authentication) ?
Why is authentication important? (3) (prevent unauthorized access, protect user data and privacy,
ensure resource validity)



11 – Authorization
What is authorization? (1)
How authorization is used? (3) (protect sensitive data, maintain system integrity in organisations,
create more streamlined user experiences)




12 – Accounting

2

,What is accounting?
Advantages of an accounting system? (5) (Audit trail, regulatory compliance, forensic analysis,
resource optimization, user accountability).
Technologies which can be used to carry out accounting? (3) (syslog servers, network analysers,
security information and event management)




13 – Security control categories
What are technical security controls? And example?
What are managerial security controls? And example?
What are operational security controls? And example?
What are physical security controls? And example?



14 – Security control types
What are preventative controls? And example of one preventative control
What are deterrent controls? And example of one deterrent control
What are detective controls? And example of one detective control
What are corrective controls? And example of a corrective control
What are compensating controls? And an example of compensating controls
What are directive controls? And an example of directive control



15 – Zero trust
What is zero trust?
What is a control plane?
What is a data plane?
Adaptive identity element in control plane?
Threat scope reduction element in control plane?
Policy driven access control element in control plane?
Secured zones element in control plane?
What is a policy engine? And how does a control plane use a policy engine to make decisions about
access?
What is a policy administrator ad how does a control plane use a policy administrator to make
decisions about access?
What is a subject / system in a data plane? And an example
What is policy enforcement point in a data plane? And give an example



16 – Gap Analysis
What is gap analysis?
What happens on each of the gap analysis steps? (4) (Define the scope of the analysis, gather data on
the current state of the organisation, analyse the data to identify the gaps, develop a plan to bridge
the gap)
Example of gap analysis (can skip)
What is technical gap analysis? And an example?

3

, What is business gap analysis? And an example?
Plan of action and milestones (POA&M)?




Answers

Protecting data and information from unauthorized access, modification, disruption, disclosure,
corruption and destruction.

C = Confidentiality. information is only accessible by those who are authorized
I = integrity. Data remains accurate and unaltered, unless modification is required.
A = availability. Information and resources are accessible when required by authorized users.

Non-repudiation = an action or event has happened and cannot be denied by parties involved.

Example = sending an email and digitally signing it means you cannot deny having sent it
since your digital signature is attached.



Authentication = verifying the identity of a user or system.
For example, logging into your email with a username and password

Authorization = what actions or resources a user can access
You might be able to read from a database (read permissions), but not make changes to it.
(Write permissions)

Accounting = tracking user activities and resource usage.
For example, dates and times you logged into the company computer. What websites you
visited and when etc.



Mitigate risk and protect the CIA of information systems and their data.
Protects CIA of information system and their data.

Security model that operates on the principle that no one inside or outside should be trusted by
default.



Adaptive identity, threat scope reduction, policy driven access control and secured zones
secured zones, threat reduction, policy access control


4

Geschreven voor

Instelling
Studie
Vak

Documentinformatie

Geüpload op
3 november 2025
Aantal pagina's
316
Geschreven in
2025/2026
Type
College aantekeningen
Docent(en)
Dion training
Bevat
Alle colleges

Onderwerpen

€13,01
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
xeon Brunel University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1164
Lid sinds
8 jaar
Aantal volgers
850
Documenten
33
Laatst verkocht
9 maanden geleden
BTEC ICT LEVEL 3 Previous Asssignments From QCF 2010

The best seller for BTEC ICT LEVEL 3 Extended Diploma in IT. Got D*D*D* in BTEC ICT LEVEL 3 Extended Diploma in IT (Which is the highest possible grade) Just finished studying computer science at Brunel University. PLEASE DO NOT BUY MY OLD COURSEWORK THINKING YOU WILL FIND ANSWERS TO YOUR ASSIGNMENT IN MY OLD COURSEWORK.

3,7

320 beoordelingen

5
137
4
71
3
44
2
30
1
38

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen