This class was created by Brainscape user Joseph Jones. Visit their profile to learn more about the creator.

Decks in this class (37)

Threat Intelligence sharing
The process through which data ge...,
The process of investigating coll...,
Intelligence cycle
23  cards
Classifying Threats
A threat that can be identified u...,
Malware,
A piece of software data or seque...
50  cards
Network Forensics
Allows for the copying of ingress...,
A piece of hardware or software t...,
A data network packet analyzer co...
33  cards
Application Monitoring
A list of permitted and denied ne...,
Firewall logs can provide you wit...,
A linux based firewall that uses ...
37  cards
Endpoint Monitoring
Software capable of detecting and...,
A type of ids or ips that monitor...,
A software agent and monitoring s...
38  cards
Email Monitoring
Unsolicited and unwanted junk ema...,
The fraudulent practice of sendin...,
A form of social engineering in w...
20  cards
Configuring your SIEM
Siem solutions can be implemented...,
A market leading big data informa...,
Collection of free and open sourc...
16  cards
Analyzing Your SIEM
A console presenting selected inf...,
A widget showing records or metri...,
A quantifiable measure used to ev...
39  cards
Digital Forensics
The process of gathering and subm...,
Written procedures ensure that pe...,
Ensure the scene is safe secure t...
38  cards
Analyzing Network IOCs
A sign that an asset or network h...,
A sharp increase in connection re...,
An attack that uses multiple comp...
32  cards
TCP Ports
File transfer protocol,
Secure shell ftp over ssh,
Telnet an unsecure remote adminis...
20  cards
UDP Ports
Domain name system uses udp for d...,
Server port for the dynamic host ...,
Client port for the dynamic host ...
20  cards
Analyzing Host-related IOCs
A process executed without proper...,
Indicators that a legitimate proc...,
Process monitor process explorer ...
46  cards
Analyzing Application-related IOCs
Symptoms of anomalous activity in...,
Verify any outbound network conne...,
Unusual request patterns or respo...
39  cards
Analyzing Lateral Movement and Pivoting IOCs
A technique to progressively move...,
The use of one infected computer ...,
A network based attack where the ...
10  cards
Incident Response Preparation
Preparationdetection and analysis...,
The act of violating an explicit ...,
Procedures and guidelines coverin...
36  cards
Detection and Containment
The ooda loop is a decision makin...,
Ooda loop,
Observe
32  cards
Eradication, Recovery and Post-incident Actions
Remove the cause of the incident ...,
The complete removal and destruct...,
A group of procedures that an org...
24  cards
Risk Mitigation
Risk identification process,
The comprehensive process of eval...,
Establish a strategic risk manage...
47  cards
Frameworks, Policies, and Procedures
Framework based governance seeks ...,
A framework that stipulates contr...,
A component of an esa framework t...
19  cards
Enumeration Tools
Process to identify and scan netw...,
A connection is made from the att...,
No connection is made from the at...
38  cards
Vulnerability Scanning
Important to identify vulnerabili...,
An evaluation of a system s secur...,
A hardware appliance or software ...
24  cards
Analyzing Output from Vulnerability Scanners
A commonly used scheme for identi...,
A superset of the cve database ma...,
A knowledge base maintained by mi...
23  cards
Mitigating Vulnerabilities
Vulnerabilities must be prioritiz...,
Remediation,
There is no countermeasure put in...
15  cards
Identity and Access Management Solutions
A security process that provides ...,
Support the identities of various...,
A policy document that promotes s...
29  cards
Network Architecture and Segmentation
The practice of assigning an id t...,
The process through which changes...,
Document that lists the reason fo...
30  cards
Hardware Assurance Best Practices
Secure working in an unsecure env...,
A legal principle that a subject ...,
A microprocessor manufacturing ut...
21  cards
Specialized Technology
A security policy set by a compan...,
The process and supporting techno...,
A mobile device management suite ...
22  cards
Non-technical Data and Privacy Controls
The process of managing informati...,
The process of applying confident...,
No restrictions on viewing the da...
36  cards
Technical Data and Privacy Controls
An access control model can be ap...,
Ncorrect permissions allocated to...,
A command line tool for showing a...
29  cards
Mitigate Software Vulnerabilities and Attacks
The processes of planning analysi...,
A software development model wher...,
A software development model that...
34  cards
Mitigate Web Application Vulnerabilities and Attacks
An injection attack occurs when t...,
A web application vulnerability t...,
An attacker executes a script to ...
32  cards
Analyzing Application Assessments
A comprehensive testing program v...,
Process of reviewing uncompiled s...,
The process of validating softwar...
20  cards
Cloud and Automation
Classifying the ownership and man...,
A service provider makes resource...,
A company creates its own cloud e...
17  cards
Service-Oriented Architecture
A software architecture where com...,
A common component of soa archite...,
A software architecture where com...
17  cards
Cloud Infrastructure Assessments
Data received by an api must pass...,
Apis should use secure authentica...,
Logs must be copied to non elasti...
10  cards
Automation Concepts and Technology
A software development method whe...,
A software development method whe...,
A software development method whe...
17  cards

More about
Comptia CYSA+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Joseph Jones's Comptia CYSA+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Comptia Security
  • 21 decks
  • 1093 flashcards
  • 1 learners
Decks: Domain 1 Security Concepts, Domain 1 General Security Concepts, Domain 1 Explain The Importance Of Using, And more!
CYSA+
  • 14 decks
  • 513 flashcards
  • 85 learners
Decks: Chapter 1 Defending Against Cybersecurit, Chapter 2 Reconnaissance And Intelligenc, Chapter 3 Designing A Vulnerability Mana, And more!
CompTIA A+
  • 28 decks
  • 3865 flashcards
  • 634 learners
Decks: Chapter 1 Mobile Devices Mc, Chapter 1 Mobile Devices, Chapter 1 Mobile Devices Key Terms, And more!
Comp TIA Chapter Reviews
  • 28 decks
  • 758 flashcards
  • 21 learners
Decks: Chapter 2 Review Operational Procedures, Chapter 3 Review The Visible Computer, Chapter 4 Review Microprocessors, And more!
Make Flashcards