This class was created by Brainscape user James Camp. Visit their profile to learn more about the creator.

Decks in this class (29)

Social Engineering Techniques
Which of the following social eng...,
A user contacted customer support...,
What is a pharming attack 3
12  cards
Types of Attacks/Malware
_____ is software installed along...,
_____ are malware concealed withi...,
_____ is a fake antivirus where a...
20  cards
Application Attacks
_____ is a malicious script hoste...,
_____ is a malicious script hoste...,
An _____ attack inserts an sql qu...
22  cards
Network Attacks
_____ is a scripting language for...,
_____ refers to using an exploit ...,
_____ is an rfid attack where an ...
16  cards
Threat actors, vectors, and intelligence sources.
_____ uses open source intelligen...
1  cards
security concepts
A _____ is a group of honeypots t...,
A _____ is a server that is inten...,
A _____ is a device used to gener...
10  cards
cloud computing concepts
_____ provides preconfigured envi...,
_____ is managed by a vendor it i...,
_____ provides companies the abil...
9  cards
application development, deployment, and automation concepts.
_____ tracks the versions of soft...,
_____ is a process that follows a...,
_____ is the act of removing or d...
8  cards
authentication and authorization design
_____ is the study and recording ...,
_____ is an in depth biometric so...,
What is hotp 3
8  cards
cybersecurity resilience
_____ is the use of multiple secu...,
An _____ consists of a collection...,
A _____ can block electromagnetic...
6  cards
implications of embedded and specialized systems.
A _____ is a microchip that conta...,
A _____ system is an industrial c...,
_____is the secure version of rea...
3  cards
cryptographic concepts
_____ is the main component of ec...,
_____ uses ephemeral keys for eac...,
_____ is a framework in which enc...
19  cards
Secure Protocols
_____ is when a port scanner uses...,
The _____ provides an automatic m...,
The _____ is a system for resolvi...
33  cards
host and application security solutions
A _____is also software located o...,
_____ means that all or part of t...,
_____ verifies application code h...
20  cards
secure network designs
A network based firewall analyzes...,
An application firewall analyzes ...,
_____ will ensure a proper failur...
28  cards
wireless security settings
_____ provides authentication aut...,
_____ is a wireless network port ...,
8021x is configured by selecting ...
20  cards
secure mobile solutions
_____ is a term that became popul...,
_____ is the practice of creating...
2  cards
cybersecurity solutions to the cloud
_____ is the on demand service ca...,
A _____ is a means of publishing ...,
A _____ is a part of security as ...
4  cards
authentication and authorization solutions
What type of attacks do kerberos ...,
A _____ is a secure cryptoprocess...,
____ is specifically designed for...
8  cards
public key infrastructure
A _____ is a trusted entity that ...,
An _____ can be used to sign and ...,
A _____ is issued to a software p...
24  cards
Security tools
The _____ command views and confi...,
The _____ command uses icmp probe...,
The _____ command performs route ...
20  cards
Incident response
_____ is an incident response lif...,
_____ is a stage in the incident ...,
_____ is a stage in the incident ...
8  cards
mitigation techniques and controls
_____ correspond to locations in ...,
_____ indicates the physical isol...,
_____ means suspicious traffic th...
4  cards
key aspects of digital forensics
A ____ is a digital file accurate...
1  cards
Various types of controls
A _____ security control provides...,
An _____ security control refers ...,
A ____ security control includes ...
8  cards
regulations, standards or frameworks.
The ____ publishes the 20 cis con...,
Department of defense cyber excha...,
_____ by the national institute o...
18  cards
policies to organizational security
The _____ for a software product ...,
The _____ describes when a vendor...,
A _____ is an outdated computing ...
20  cards
risk management processes and concepts
A ____ is a repository for docume...,
A _____ assessment evaluates all ...,
_____ is the likelihood and impac...
10  cards
privacy and sensitive data concepts
_____ involves stealing ideas inv...,
_____ is a database de identifica...,
A _____ process is a practice of ...
15  cards

More about
CompTIA Sec+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study James Camp's CompTIA Sec+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Sec+ SY0-701
  • 22 decks
  • 953 flashcards
  • 619 learners
Decks: Comptia Sec Sy0 701 Acronyms V1, Comptia Sec Sy0 701 Acronyms V2, Comptia Sec Sy0 701 Acronyms V3, And more!
Sec+
  • 16 decks
  • 936 flashcards
  • 347 learners
Decks: Ch 1 5, Sec Vista, Ch 6 7 8, And more!
CompTIA A+
  • 28 decks
  • 3865 flashcards
  • 740 learners
Decks: Chapter 1 Mobile Devices Mc, Chapter 1 Mobile Devices, Chapter 1 Mobile Devices Key Terms, And more!
Make Flashcards