Flearn Website Header

ComptiaSecurity+ Security Operations


Master ComptiaSecurity+ Security Operations with our interactive study cards designed for effective learning. These flashcards use proven spaced repetition techniques to help you memorize key concepts, definitions, and facts. Perfect for students, professionals, and lifelong learners seeking to improve knowledge retention and ace exams through active recall practice.


Click any card to reveal the answer

What is a Security Operations Center (SOC)?

click to flip

Answer:

Centralized facility that monitors analyzes and responds to security incidents

What is SIEM?

click to flip

Answer:

Security Information and Event Management - system that collects and analyzes security logs

What is the purpose of log aggregation?

click to flip

Answer:

Collecting logs from multiple sources into central location for analysis

What is correlation in SIEM?

click to flip

Answer:

Analyzing relationships between events from different sources to identify threats

What are the phases of incident response?

click to flip

Answer:

Preparation Identification Containment Eradication Recovery Lessons Learned

What is the preparation phase of incident response?

click to flip

Answer:

Establishing policies tools training and procedures before incidents occur

What is the identification phase?

click to flip

Answer:

Detecting and confirming that a security incident has occurred

What is containment in incident response?

click to flip

Answer:

Limiting the scope and impact of the security incident

📢
Advertisement
See Your Advert Here!

What is eradication?

click to flip

Answer:

Removing the threat and restoring systems to secure state

What is the recovery phase?

click to flip

Answer:

Restoring normal operations and monitoring for recurrence

What are lessons learned?

click to flip

Answer:

Post-incident review to improve future response and prevention

What is a playbook?

click to flip

Answer:

Documented procedures for responding to specific types of security incidents

What is an IDS?

click to flip

Answer:

Intrusion Detection System - monitors network traffic for suspicious activity

What is an IPS?

click to flip

Answer:

Intrusion Prevention System - actively blocks detected threats

What is the difference between IDS and IPS?

click to flip

Answer:

IDS detects and alerts IPS detects and blocks threats

What is signature-based detection?

click to flip

Answer:

Identifying threats using known patterns and signatures

📢
Advertisement
See Your Advert Here!

What is anomaly-based detection?

click to flip

Answer:

Identifying threats by detecting deviations from normal behavior

What is behavior-based detection?

click to flip

Answer:

Identifying threats based on actions and patterns of behavior

What is a false positive?

click to flip

Answer:

Alert triggered when no actual threat exists

What is a false negative?

click to flip

Answer:

Failure to detect an actual threat

What is threat hunting?

click to flip

Answer:

Proactive search for threats that have evaded existing security controls

What is threat intelligence?

click to flip

Answer:

Information about current and emerging threats used to inform security decisions

What are IoCs?

click to flip

Answer:

Indicators of Compromise - artifacts that indicate potential security incidents

What is a CSIRT?

click to flip

Answer:

Computer Security Incident Response Team responsible for handling incidents

📢
Advertisement
See Your Advert Here!

What is chain of custody?

click to flip

Answer:

Documented record of evidence handling from collection to presentation

What is digital forensics?

click to flip

Answer:

Process of collecting preserving analyzing and presenting digital evidence

What are the steps in digital forensics?

click to flip

Answer:

Identification Collection Acquisition Preservation Analysis Reporting

What is forensic imaging?

click to flip

Answer:

Creating bit-by-bit copy of storage media for analysis

What is write blocker?

click to flip

Answer:

Device that prevents modification of evidence during forensic acquisition

What is live analysis?

click to flip

Answer:

Examining systems while they are running to capture volatile data

What is order of volatility?

click to flip

Answer:

Sequence for collecting evidence based on how quickly it disappears

What is vulnerability management?

click to flip

Answer:

Continuous process of identifying assessing and remediating vulnerabilities

📢
Advertisement
See Your Advert Here!

What is vulnerability scanning?

click to flip

Answer:

Automated assessment to identify security weaknesses

What is a vulnerability assessment?

click to flip

Answer:

Systematic examination to identify and evaluate security vulnerabilities

What is patch management?

click to flip

Answer:

Process of acquiring testing deploying and verifying software updates

What is change management?

click to flip

Answer:

Formal process for managing modifications to IT systems and infrastructure

What is configuration management?

click to flip

Answer:

Maintaining and controlling system configurations and baselines

What is hardening?

click to flip

Answer:

Reducing attack surface by removing unnecessary services and securing configurations

What is least functionality principle?

click to flip

Answer:

Configuring systems with only essential features and services enabled

What is baseline configuration?

click to flip

Answer:

Standard secure configuration applied to systems

📢
Advertisement
See Your Advert Here!

What is deprovisioning?

click to flip

Answer:

Process of removing access rights when users leave or change roles

What is sandboxing?

click to flip

Answer:

Isolating applications or code in restricted environments for testing

What is network segmentation?

click to flip

Answer:

Dividing network into separate zones to limit threat spread

What is a DMZ?

click to flip

Answer:

Demilitarized Zone - network segment that separates external and internal networks

What is backups and why are they important?

click to flip

Answer:

Copies of data to restore after data loss incidents or ransomware attacks

What are the backup types?

click to flip

Answer:

Full backup Incremental backup Differential backup

What is a full backup?

click to flip

Answer:

Complete copy of all selected data

What is an incremental backup?

click to flip

Answer:

Backup of only data changed since last backup

📢
Advertisement
See Your Advert Here!

What is a differential backup?

click to flip

Answer:

Backup of data changed since last full backup

What is backup rotation?

click to flip

Answer:

Scheduled strategy for creating and retaining backups over time

What is 3-2-1 backup rule?

click to flip

Answer:

3 copies on 2 different media with 1 offsite

Remember: Use all available resources to study. Flearn alone cannot guarantee success in any exams—make sure to supplement your learning!