This class was created by Brainscape user Salewa Aderonmu. Visit their profile to learn more about the creator.

Decks in this class (28)

Lesson 7 - Questions
What is the difference between au...,
What steps should be taken to enr...,
True or false an account requirin...
19  cards
Lesson 8 - Questions
You are consulting with a company...,
What is the process of ensuring a...,
What is the policy that states us...
23  cards
Lesson 9 - Questions
A recent security evaluation conc...,
You are discussing a redesign of ...,
Why is subnetting useful in secur...
19  cards
Lesson 10 - Questions
True or false as they protect dat...,
What distinguishes host based per...,
True or false when deploying a no...
14  cards
Lesson 11 - Questions
What vulnerabilities does a rogue...,
Why is it vital to ensure the sec...,
True or false the contents of the...
19  cards
Lesson 12 - Questions
What use is made of a tpm for nac...,
Why are os enforced file access c...,
What use is a tpm when implementi...
16  cards
Lesson 13 - Questions
0  cards
CompTIA Security+ SYO-601 Questions
What are the properties of a secu...,
What term is used to describe the...,
A multinational company manages a...
79  cards
CompTIA Security+ Questions (Lesson 1-10)
Consider the types of zones withi...,
Where should an administrator pla...,
There are several types of securi...
163  cards
CompTIA Security+ Questions (Lesson 11-21)
An attacker modifies the hosts fi...,
A system administrator is configu...,
An organization routinely communi...
152  cards
Lesson 4 - Identifying Social Engineering and Malware
A class of malware that modifies ...,
A class of malware that modifies ...,
A malicious program or script tha...
13  cards
Lesson 5 - Summarizing Basic Cryptographic Concepts
The science and practice of alter...,
Unencrypted data that is meant to...,
Data that has been enciphered and...
64  cards
Lesson 6 - Implementing Public Key Infrastructure
Framework of certificate authorit...,
A server that guarantees subject ...,
Critical pki concept and shows ho...
34  cards
Lesson 7 - Implementing Authentication Controls
A security process that provides ...,
The process by which a user accou...,
A method of validating a particul...
50  cards
Lesson 8 - Implementing Identity and Account Management Controls
The process of bringing in a new ...,
An agreement that stipulates that...,
A concept that states that duties...
41  cards
Lesson 9 - Implement Secure Network Designs
Typical weaknesses in secure netw...,
In ethernet a networking device t...,
Provide a bridge between a cabled...
103  cards
Lesson 10 - Implementing Network Security Appliances
A type of firewall that does not ...,
A technique used in firewalls to ...
56  cards
Lesson 11 - Implementing Secure Network Protocols
Provides an automatic method for ...,
Is a type of dos attack where a r...,
Resolves fully qualified domain n...
49  cards
Lesson 12 - Implementing Host Security Solutions
A cryptographic module embedded w...,
A specification for hardware base...,
A type of system firmware providi...
43  cards
Lesson 13 - Implementing Secure Mobile Solutions
Methods of provisioning mobile de...,
Security framework and tools to f...,
Enterprise mobile device provisio...
42  cards
Lesson 14 - Summarizing Secure Application Concepts
0  cards
Lesson 15 - Implementing Secure Cloud Solutions
Classifying the ownership and man...,
A cloud that is deployed for shar...,
A vendor offering public cloud se...
12  cards
Lesson 19 - Summarizing Risk Management Concepts
Risk that an event will pose if n...,
The response of reducing risk to ...,
In risk mitigation the response o...
24  cards
Lesson 16 - Explaining Data Privacy and Protection Concepts
0  cards
Lesson 17 -
0  cards
Lesson 18 -
0  cards
Lesson 20
A brownout occurs when the power ...,
Advanced strip socket that provid...,
A battery powered device that sup...
40  cards
Lesson 21 - Explain the Importance of Physical Site Security Controls
Controls that restrict detect and...,
Create access lists and identific...,
Create access lists and identific...
29  cards

More about
comptia security+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Salewa Aderonmu's CompTIA Security+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security+ SY0-501
  • 13 decks
  • 212 flashcards
  • 1050 learners
Decks: Infrastructure Security Devices, Network Segmentation, Firewall And Switch Protection, And more!
CompTIA Linux+
  • 20 decks
  • 752 flashcards
  • 776 learners
Decks: 01 Introduction, 11 The Shell, 12 Help, And more!
Comptia CYSA+
  • 37 decks
  • 1033 flashcards
  • 44 learners
Decks: Threat Intelligence Sharing, Classifying Threats, Network Forensics, And more!
Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
Make Flashcards