This class was created by Brainscape user Kassandra Strong. Visit their profile to learn more about the creator.

Decks in this class (24)

1A
A ____ is any circumstance or eve...,
A threat is a ___ danger that ___...,
The model microsoft uses for thre...
37  cards
Teacher Highlights
The model microsoft uses for thre...,
What does stride stand for,
What is spoofing
70  cards
1B
___ ___ is a non technical or low...,
Social engineering is commonly kn...,
The purpose of social engineering...
11  cards
1C
___ ___ is software or scripts wr...,
Malicious code includes a broad c...,
____ is software designed to infi...
47  cards
1D
A ___ ___ consists of multiple en...,
A ___ ___ in a supply chain is an...,
Third party support services can ...
8  cards
2A
What does nac stand for,
___ is a wired and wireless netwo...,
Any system not meeting nac condit...
25  cards
2B
Systems that provide centralizati...,
Together these make up the first ...,
___ means presenting information ...
14  cards
2C
A system or network can be thorou...,
What does sdlc stand for,
The development process of an app...
37  cards
2D
The basic input output system bio...,
___ ___ has the system digitally ...,
Universal serial bus usb flash dr...
28  cards
3A
___ are critical as a form of cyb...,
Firewalls accomplish this by moni...,
Firewalls can be implemented as h...
62  cards
4A
Firewalls allow a network adminis...,
When creating your firewall plan ...,
The following describes which sec...
18  cards
5A
The incident response policy is d...,
The incident response policy spec...,
Reporting accurate incident infor...
35  cards
5B
The primary goal of the first res...,
There are six steps taken in resp...,
The six steps taken in response t...
9  cards
Kahoots
What involves psychological manip...,
True or false a targeted social e...,
True or false cybersecurity in th...
91  cards
5C
As previously explained in object...,
In accordance with ____ the cyber...,
What are the five steps to a cybe...
13  cards
6A
Cybersecurity experts estimate th...,
___ ___ refers to the practices a...,
___ monitor data packets passing ...
17  cards
6C
The baseline configuration is the...,
This baseline is originally creat...,
____ is the measuring of a system...
8  cards
6D
___ ___ is the process for mainta...,
Misconfigurations can lead to ___...,
When undocumented changes occur a...
11  cards
6E
___ and ___ refer to the process ...,
Backing up data requires ___ and ...,
Data from an earlier time can onl...
47  cards
7A
___ ___ compliance ensures approp...,
The focus of compusec is on end p...,
The compusec objective is to empl...
35  cards
7B
What does tempest stand for,
Formerly called emissions securit...,
Tempest vulnerabilities come from...
14  cards
7C
Information protection ip is a su...,
What does ip stand for,
Information protection consists o...
64  cards
7D
The purpose of ___ ___ opsec is t...,
Opsec is a process of identifying...,
Opsec is the responsibility of __...
8  cards
7E
Communications security comsec is...,
He objective of the comsec progra...,
What does comsec stand for
15  cards

More about
block 5 - cyber security

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Kassandra Strong's Block 5 - Cyber Security flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Cyber Security (CompTIA Security+)
  • 41 decks
  • 1670 flashcards
  • 5 learners
Decks: Chapter 1 Threats Attacks And Vulnerabil, Chapter 11 Social Engineering, Chapter 12 Attack Types, And more!
Cyber
  • 6 decks
  • 98 flashcards
  • 1 learners
Decks: Basic, Cyberbook, Basic2, And more!
IT Cybersecurity
  • 14 decks
  • 443 flashcards
  • 63 learners
Decks: A It Essentials Quiz 1, A It Essentials Quiz 2, A It Essentials Quiz 3, And more!
Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
Make Flashcards