Brainscape
Find Flashcards
Discover millions of Flashcards
Browse Brainscape-Certified Flashcards
Learn faster with our catalog of expert certified, pre-made flashcards.
Browse All Flashcards
Browse our full catalog of user-generated and Brainscape-Certified flashcards.
Explore the
Knowledge Genome
of subjects:
Entrance Exams
Professional Certifications
Foreign Languages
Medical & Nursing
Science
English
Humanities & Social Studies
Mathematics
Law
Vocations
Health & Fitness
Business & Finance
Technology & Engineering
Food & Beverage
Fine Arts
Random Knowledge
Make Flashcards
How It Works
Features Overview
The Science of Studying
Educators
Schools & Teachers
Tutors & Resellers
Businesses
Employee Training
Publishers & Resellers
Academy
Academy Homepage
The Science of Studying
Study Tips
Teaching Tips
Employee Training Tips
Language Learning Tips
Test Prep Tips
Log in
My Dashboard
Get Started
Log out
Security+ SY0-601
> 4.4 Apply Mitigation Techniques and Controls After an Incident > Flashcards
4.4 Apply Mitigation Techniques and Controls After an Incident Flashcards
(0 cards)
Study These Flashcards
Security+ SY0-601
flashcards
Decks in class (37)
# Cards
1.0 Acronyms
292
1.1 Social Engineering Techniques
22
1.2 Malware Types
47
1.3 Application Attacks
25
1.4 Network Attacks
23
1.5 Threat Actors, Vectors, Intelligence Sources
39
1.6 Vulnerability Types
12
1.7 Security Assessment Techniques
14
1.8 Pen Testing Techniques
17
2.1 Security Concepts in Enterprise Environments
30
2.2 Virtualization and Cloud Computing
24
2.3 Application Development, Deployment, Automation Concepts
18
2.4 Authentication and Authorization Design Concepts
19
2.5 Implement Cybersecurity Resilience
28
2.6 Embedded and Specialized Systems
14
2.7 Physical Security Controls
16
2.8 Basic Cryptographic Concepts
37
3.1 Implement Secure Protocols
17
3.2 Implement Host or Application Security Solutions
27
3.3 Implement Secure Network Designs
43
3.4 Install and Configure Secure Wireless Settings
20
3.5 Implement Secure Mobile Solutions
17
3.6 Apply Cybersecurity Solutions to the Cloud
0
3.7 Implement Identity and Account Management Controls
0
3.8 Implement Authentication and Authorization Solutions
0
3.9 Implement Public Key Infrastructure
22
4.1 Assess Organizational Security
0
4.2 Policies, Processes and Procedures for Incident Response
0
4.3 Use Data Sources to Support Investigations
0
4.4 Apply Mitigation Techniques and Controls After an Incident
0
4.5 Key Aspects of Digital Forensics
0
5.1 Types of Controls
0
5.2 Importance of Regulations, Standards, Frameworks Impact
0
5.3 Importance of Policies on Organizational Security
0
5.4 Risk Management Processes and Concepts
0
5.5 Privacy and Sensitive Data Concepts
0
Incorrect Study Questions
9