This class was created by Brainscape user sylwia latkowska. Visit their profile to learn more about the creator.

Decks in this class (46)

Control Objectives
Control objective 1,
Proportionality 2,
Defense in depth 3
14  cards
Control Objectives 2
Directive controls 1,
Control category operational 2,
Control classification corrective 3
18  cards
Security And Privacy
Authentication 1,
Non repudiation 2,
Accounting 3
5  cards
Zero Trust
Zero trust 1,
Data plane 2,
Policy administrator 3
14  cards
Physical Security
Passive infrared 1,
Pick resisitant lock 2,
Cpted 3
13  cards
Environmental Impact
Hot aisle 1,
Cold aisle 2,
Esd 3
16  cards
Deception And Disruption
Honeynet 1,
Dns sinkhole 2,
Spam trap 3
8  cards
Configuration Management
Idempotency 1,
Cm configuration management 2,
Configuration items ci 3
9  cards
Change Management
Emergency change 1,
Rollback strategy 2,
Standard change 3
12  cards
Cryptography Primer
Digital certificates dc 1,
Key cryptovariable 2,
Depreciated algorithm 3
25  cards
Encryption
El gamal 1,
Kpms key management practices sta...,
Ecc elliptic curve crypto system 3
23  cards
Hashing
Collision 1,
Rsa rivest shamir adelman 2,
Salting 3
20  cards
Digital Certification
Certification authority 1,
Extended validation 2,
Registration authority 3
7  cards
AAA - Authentication, Authorization, Accounting
Identification 1,
Authentication 2,
Authorization 3
7  cards
GAP Analysis
Gap analysis 1,
Baseline in gap analysis 2,
Gap analysis process 3
4  cards
Technical Change Management
Allow list deny list 1,
Restricted activities 2,
Downtime during change 3
5  cards
Emerging Cryptography
She somewhat homomorphic encrypti...,
Phe partially homomorphic encrypt...,
Quantum encryption 3
6  cards
Steganography
Steganalysis 1,
Concealment 2,
Cover image 3
7  cards
Honeypots
Honey pots example 1
1  cards
Threat Actors And Motivation
Script kiddies 1,
Shadow it 2,
Adversary 3
14  cards
Threat Modelling And Intelligence
Architecture centric 1,
Threat intelligence 2,
Threat modeling 3
8  cards
Operational Threat Vectors
Eos 1,
Data exploration 2,
Attack surface 3
9  cards
THIRD PARTY AND SUPPLY CHAIN THREAT VECTORS
Third party 1,
Supply chain 2,
System spawl 3
13  cards
Public Key Infrastructure
Pki public key infrastructure 1,
Symmetric encryption 2,
Asymmetric encryption 3
5  cards
Obfuscation
Obfuscation 1,
Cover text 2,
Tokenization 3
3  cards
Social Engineering
Disinformation 1,
Shoulder surfing 2,
Shallow fake 3
16  cards
Vulneribility Primer
Responsible disclosure 1,
Zero day 2,
Exploit 3
10  cards
Types Of Vulnerabilities
Jailbreaking 1,
Side channel 2,
Memory leak 3
14  cards
Indicators Of Malicious Activity
Incident response plan 1,
Ioa indicator of attack 2,
Iocs indicator of compromise 3
6  cards
Brute Force Attack
Discovery 1,
Rate limiting 2,
Account lockout 3
11  cards
Application Attacks
Xss cross site scripting attack 1,
Directory traversal 2,
Input validation 3
9  cards
Wireless Attacks
Evil twin 1,
Deauthentication 2,
Spoofing 3
18  cards
Cryptographic Attacks
Birthday attack 1,
Side channel attack 2,
Broken 3
14  cards
Malware Attacks
Ransomware 1,
Bloat ware 2,
Logic bomb 3
23  cards
Digital Infrastructure Attacks
Dos denial of services 1,
Targetted attack 2,
Poisoning 3
18  cards
Secure Design Principles
Zero trust 1,
Trust but verify 2,
Least privilege 3
13  cards
Segmentation And Isolation
Enclave 1,
Micro segmentation 2,
Security zone 3
17  cards
Computing Architecture Models
Micro services architecture 1,
Ics industrial control systems 2,
Cloud computing 3
7  cards
Cloud Services
Cloud brushing 1,
Private cloud 2,
Community cloud 3
16  cards
Cloud Infrastructure
Cloud instance 1,
Standby instance 2,
Cloud availability zone 3
16  cards
Data Centers Solution Elements
Infrastructure as a code 1,
Elasticity 2,
Micro services 3
11  cards
Virtualization
Host 1,
Virtual machine escape 2,
Virtualization spawl 3
12  cards
Embeded Systems
Rtos real time operating system 1,
Active side channel 2,
Scada supervisory control and dat...
11  cards
Internet Of Things
Iot internet of things 1,
Sed smart edge device 2,
Smart device 3
11  cards
Network Devices
False positive 1,
Appliance 2,
True negative 3
10  cards
Network Access Control
Jump server 1,
Nac network access control 2,
Proxy server 3
7  cards

More about
COMPtia Security+-701 Flashcards

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study sylwia latkowska's COMPtia Security+-701 Flashcards flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security+ (SY0-701)
  • 30 decks
  • 918 flashcards
  • 313 learners
Decks: Acronym List A D, Acronym E M, Acronym N T, And more!
CompTIA Sec+ SY0-701
  • 22 decks
  • 953 flashcards
  • 592 learners
Decks: Comptia Sec Sy0 701 Acronyms V1, Comptia Sec Sy0 701 Acronyms V2, Comptia Sec Sy0 701 Acronyms V3, And more!
Security+ (SY0-701)
  • 22 decks
  • 1650 flashcards
  • 415 learners
Decks: Lesson 1 Summarize Fundamental Security, Lesson 2 Compare Threat Types, Lesson 3 Explain Cryptographic Solutions, And more!
CompTIA Security +
  • 35 decks
  • 2012 flashcards
  • 12 learners
Decks: Fundamentals Of Security, Threat Actors, Physical Security, And more!
Make Flashcards