CompTIA Security + (SY0-701)

This class was created by Brainscape user Amreek Paul. Visit their profile to learn more about the creator.

Decks in this class (238)

Section 2.5 Threats and Vulnerabilities
Objectives 1.1 Compare and contrast various types of security controls Objectives 1.2 - Summarise fundamental security concepts
3  cards
Section 2.6 Confidentiality
Objectives 1.1 Compare and contrast various types of security controls Objectives 1.2 - Summarise fundamental security concepts
3  cards
Section 2.7 Integrity
Objectives 1.1 Compare and contrast various types of security controls Objectives 1.2 - Summarise fundamental security concepts
3  cards
Section 2.8 Availability
Availability footnotesection 2 fu...,
3 main reasonswhy is availability...,
When hear availabity you must thi...
5  cards
Section 2.9 Non-Repudiation
Objectives 1.1 Compare and contrast various types of security controls Objectives 1.2 - Summarise fundamental security concepts
4  cards
Section 2.10 Authentication
Objectives 1.1 Compare and contrast various types of security controls Objectives 1.2 - Summarise fundamental security concepts
4  cards
Section 2.11 Authorisation
Objectives 1.1 Compare and contrast various types of security controls Objectives 1.2 - Summarise fundamental security concepts
2  cards
Section 2.12 Accounting
Objectives 1.1 Compare and contrast various types of security controls Objectives 1.2 - Summarise fundamental security concepts
3  cards
Section 2.13 Security control categories
Objectives 1.1 Compare and contrast various types of security controls Objectives 1.2 - Summarise fundamental security concepts
5  cards
Section 2.14 Security control types
Objectives 1.1 Compare and contrast various types of security controls Objectives 1.2 - Summarise fundamental security concepts
7  cards
Section 2.15 Gap Analysis
Gap analysis,
Why is conducting gap analysis im...,
How to conduct one 4 breif steps ...
5  cards
Section 2.16 Zero Trust
Zero trust,
To create a zero trust architectu...,
4 key elementscontrol plane elements
6  cards
Section 3.18 Threat Actor
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
4  cards
Section 3.19 Threat Actor Attributes
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
3  cards
Section 3.20 Unskilled Attackers
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
3  cards
Section 3.21 Hacktivists
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
6  cards
Section 3.22 Organised Crime
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
5  cards
Section 3.23 Nation State Actor
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
7  cards
Section 3.24 Insider Threats
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
4  cards
Section 3.25 Shadow IT
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
3  cards
Section 3.26 Threat Vectors and Attack Surfaces
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
9  cards
Section 3.27 Outsmarting Threat Actors
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
8  cards
Section 4.29 Physical Security: Fencing and Bollards
Objectives 1.2 Summarise fundamental security concepts Objectives 2.4 Analyse indicators of malicious activity
4  cards
Section 4.30 Attacking with Brute Force
Objectives 1.2 Summarise fundamental security conceptsObjectives 2.4 Analyse indicators of malicious activity
4  cards
Section 4.31 Surveillance Systems
Objectives 1.2 Summarise fundamental security concepts Objectives 2.4 Analyse indicators of malicious activity
6  cards
Section 4.32 Bypassing Surveillance Systems
Objectives 1.2 Summarise fundamental security concepts Objectives 2.4 Analyse indicators of malicious activity
6  cards
Section 4.33 Access Control Vestibule's
Objectives 1.2 Summarise fundamental security concepts Objectives 2.4 Analyse indicators of malicious activity
5  cards
Section 4.34 Door Locks
Objectives 1.2 Summarise fundamental security concepts Objectives 2.4 Analyse indicators of malicious activity
4  cards
Section 4.35 Access Badge cloning
Objectives 1.2 Summarise fundamental security concepts Objectives 2.4 Analyse indicators of malicious activity
3  cards
Section 5.37 Social Engineering Motivation Triggers
Objectives 2.2 Explain common threat vectors and attack surfaces Objectives 5.6 Given a scenario, implement security awareness practices
8  cards
Section 5.38 Impersonation
Objectives 2.2 Explain common threat vectors and attack surfaces Objectives 5.6 Given a scenario, implement security awareness practices
5  cards
Section 5.39 Pretexting
Objectives 2.2 Explain common threat vectors and attack surfaces Objectives 5.6 Given a scenario, implement security awareness practices
1  cards
Section 5.40 Phishing Attacks
Objectives 2.2 Explain common threat vectors and attack surfaces Objectives 5.6 Given a scenario, implement security awareness practices
7  cards
Section 5.41 Preventing Phishing Attacks
Objectives 2.2 Explain common threat vectors and attack surfaces Objectives 5.6 Given a scenario, implement security awareness practices
4  cards
Section 5.42 Conducting an Anti-Phishing attack
Objectives 2.2 Explain common threat vectors and attack surfaces Objectives 5.6 Given a scenario, implement security awareness practices
1  cards
Section 5.43 Frauds and Scams
Objectives 2.2 Explain common threat vectors and attack surfaces Objectives 5.6 Given a scenario, implement security awareness practices
6  cards
Section 5.44 Influence Campaigns
Objectives 2.2 Explain common threat vectors and attack surfaces Objectives 5.6 Given a scenario, implement security awareness practices
3  cards
Section 5.45 Other Social Engineering Attacks
Objectives 2.2 Explain common threat vectors and attack surfaces Objectives 5.6 Given a scenario, implement security awareness practices
9  cards
Section 6.46 Malware
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
3  cards
Section 6.47 Viruses
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
12  cards
Section 6.48 Worms
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
3  cards
Section 6.49 Trojans
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
2  cards
Section 6.51 Ransomware
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
4  cards
Section 6.52 Zombies and Botnets
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
5  cards
Section 6.53 Rootkits
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
9  cards
Section 6.54 Backdoors and Logic Bombs
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
3  cards
Section 6.55 Keylogger
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
4  cards
Section 6.56 Spyware and Bloatware
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
5  cards
Section 6.57 Malware Attack Techniques
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
9  cards
Section 6.58 Indications of Malware attacks
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
9  cards
Section 7.60 Data Protection and Classifications
Objectives 14 Explain the importance of using appropriate cryptographic solutions. Objectives 3.3 Compare and contrast strategies to protect data. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management. Objectives 4.4 Explain security alerting, monitoring concepts and tools. Objectives 5.1 Summarise elements of effective security governance.
8  cards
Section 7.61 Data Ownership
Objectives 14 Explain the importance of using appropriate cryptographic solutions. Objectives 3.3 Compare and contrast strategies to protect data. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management. Objectives 4.4 Explain security alerting, monitoring concepts and tools. Objectives 5.1 Summarise elements of effective security governance.
9  cards
Section 7.62 Data States
Objectives 14 Explain the importance of using appropriate cryptographic solutions. Objectives 3.3 Compare and contrast strategies to protect data. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management. Objectives 4.4 Explain security alerting, monitoring concepts and tools. Objectives 5.1 Summarise elements of effective security governance.
6  cards
Section 7.63 Data Types
Objectives 14 Explain the importance of using appropriate cryptographic solutions. Objectives 3.3 Compare and contrast strategies to protect data. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management. Objectives 4.4 Explain security alerting, monitoring concepts and tools. Objectives 5.1 Summarise elements of effective security governance.
9  cards
Section 7.64 Data Sovereignty
Objectives 14 Explain the importance of using appropriate cryptographic solutions. Objectives 3.3 Compare and contrast strategies to protect data. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management. Objectives 4.4 Explain security alerting, monitoring concepts and tools. Objectives 5.1 Summarise elements of effective security governance.
4  cards
Section 7.65 Securing Data
Objectives 14 Explain the importance of using appropriate cryptographic solutions. Objectives 3.3 Compare and contrast strategies to protect data. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management. Objectives 4.4 Explain security alerting, monitoring concepts and tools. Objectives 5.1 Summarise elements of effective security governance.
8  cards
Section 7.66 Data Loss Prevention (DLP)
Objectives 14 Explain the importance of using appropriate cryptographic solutions. Objectives 3.3 Compare and contrast strategies to protect data. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management. Objectives 4.4 Explain security alerting, monitoring concepts and tools. Objectives 5.1 Summarise elements of effective security governance.
5  cards
Section 8.68 Cryptographic Solutions: Symmetric v Asymmetric
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyze indicators of malicious activity
3  cards
Section 8.69 Symmetric vs Asymmetric
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity
5  cards
Section 8.70 Symmetric Algorithms
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity
6  cards
Section 8.71 Asymmetric Algorithms
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.
7  cards
Section 8.72 Hashing
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.
9  cards
Section 8.73 Increasing Hash Security
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.
6  cards
Section 8.74 Public Key Infrastructure (PKI)
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.
4  cards
Section 8.75 Digital Certificates
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.
17  cards
Section 8.77 Blockchain
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.
7  cards
Section 8.78 Encryption Tools
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.
5  cards
Section 8.79 Obfuscation
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.
3  cards
Section 8.80 Cryptographic Attacks
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.
10  cards
Section 9.81 Risk Management
Objective 5.2: Explain elements of the risk management process
6  cards
Section 9.82 Risk Assessment Frequency
Objective 5.2: Explain elements of the risk management process
6  cards
Section 9.83 Risk Identification and Analysis
Objective 5.2: Explain elements of the risk management process
7  cards
Section 9.84 Risk Register
Objective 5.2: Explain elements of the risk management process
12  cards
Section 9.85 Qualitative Risk Analysis
Objective 5.2: Explain elements of the risk management process
3  cards
Section 9.86 Quantitative Risk Analysis
Objective 5.2: Explain elements of the risk management process
6  cards
Section 9.87 Risk Management Strategies
Objective 5.2: Explain elements of the risk management process
6  cards
Section 9.89 Risk Monitoring and Reporting
Objective 5.2: Explain elements of the risk management process
8  cards
Section 10.90 Third-party Vendor Risks & Supply Chain Risks
Objectives 2.2 Explain common threat vectors and attack surfaces. Objectives 2.3 Explain various types of vulnerabilities. Objectives 5.3 Explain the processes associated with third-party risk assessment and management.
6  cards
Section 10.91 Supply Chain Attacks
Objectives 2.2 Explain common threat vectors and attack surfaces. Objectives 2.3 Explain various types of vulnerabilities. Objectives 5.3 Explain the processes associated with third-party risk assessment and management.
3  cards
Section 10.92 Vendor Assessment
Objectives 2.2 Explain common threat vectors and attack surfaces. Objectives 2.3 Explain various types of vulnerabilities. Objectives 5.3 Explain the processes associated with third-party risk assessment and management.
9  cards
Section 10.93 Vendor Selection and Monitoring
Objectives 2.2 Explain common threat vectors and attack surfaces. Objectives 2.3 Explain various types of vulnerabilities. Objectives 5.3 Explain the processes associated with third-party risk assessment and management.
5  cards
Section 10.94 Contracts and Agreements
Objectives 2.2 Explain common threat vectors and attack surfaces. Objectives 2.3 Explain various types of vulnerabilities. Objectives 5.3 Explain the processes associated with third-party risk assessment and management.
8  cards
Section 11.95 Governance and Compliance
Objectives 5.1 Summarise elements of effective security governance. Objectives 5.4 Summarise elements of effective security compliance
10  cards
Section 11.96 Governance
Objectives 5.1 Summarise elements of effective security governance. Objectives 5.4 Summarise elements of effective security compliance
4  cards
Section 11.97 Governance Structures
Objectives 5.1 Summarise elements of effective security governance. Objectives 5.4 Summarise elements of effective security compliance
6  cards
Section 11.98 Policies
Objectives 5.1 Summarise elements of effective security governance. Objectives 5.4 Summarise elements of effective security compliance
7  cards
Section 11.99 Standards
Objectives 5.1 Summarise elements of effective security governance. Objectives 5.4 Summarise elements of effective security compliance
5  cards
Section 11.100 Procedures
Objectives 5.1 Summarise elements of effective security governance. Objectives 5.4 Summarise elements of effective security compliance
4  cards
Section 11.101 Governance Considerations
Objectives 5.1 Summarise elements of effective security governance. Objectives 5.4 Summarise elements of effective security compliance
4  cards
Section 11.102 Compliance
Objectives 5.1 Summarise elements of effective security governance. Objectives 5.4 Summarise elements of effective security compliance
11  cards
Section 11.103 Non-compliance Consequences
Objectives 5.1 Summarise elements of effective security governance. Objectives 5.4 Summarise elements of effective security compliance
6  cards
Section 12.104 Asset and Change Management
Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.
2  cards
Section 12.105 Acquisition and Procurement
Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.
7  cards
Section 12.106 Mobile Asset Deployments
Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.
4  cards
Section 12.107 Asset Management
Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.
10  cards
Section 12.108 Asset Disposal and Decommissioning
Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.
12  cards
Section 12.109 Change Management
Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.
7  cards
Section 12.110 Change Management process
Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.
9  cards
Section 12.111 Technical Implications of Changes
Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.
7  cards
Section 12.112 Documenting Changes
Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.
6  cards
Section 13.113 Audits and Assessments
Objective 5.5: Explain types and purposes of audits and assessments
6  cards
Section 13.114 Internal Audits and Assessments
Objective 5.5 Explain types and purposes of audits and assessments
10  cards
Section 13.115 Performing an Internal Assessment
Objective 5.5 Explain types and purposes of audits and assessments
5  cards
Section 13.116 External Audits and Assessments
Objective 5.5 Explain types and purposes of audits and assessments
7  cards
Section 13.117 Performing an External Assessment
Objective 5.5 Explain types and purposes of audits and assessments
4  cards
Section 13.118 Penetration Testing
Objective 5.5 Explain types and purposes of audits and assessments
5  cards
Section 13.119 Reconnaissance in Pentesting
Objective 5.5 Explain types and purposes of audits and assessments
7  cards
Section 13.120 Performing a Basic PenTest
Objective 5.5 Explain types and purposes of audits and assessments
1  cards
Section 113.121 Attestation of Findings
Objective 5.5 Explain types and purposes of audits and assessments
7  cards
Section 14.122 Cyber Resilience and Redundancy
Objective 3.4 Explain the importance of resilience and recovery in security architecture
4  cards
Section 14.123 High Availability
Objective 3.4 Explain the importance of resilience and recovery in security architecture
9  cards
Section 14.124 Data Redundancy
Objective 3.4 Explain the importance of resilience and recovery in security architecture
9  cards
Section 14.126 Capacity Planning
Objective 3.4 Explain the importance of resilience and recovery in security architecture
5  cards
Section 14.127 Powering Data Centers
Objective 3.4 Explain the importance of resilience and recovery in security architecture
10  cards
Section 14.128 Data Backups
Objective 3.4 Explain the importance of resilience and recovery in security architecture
11  cards
Section 14.129 Continuity of Operations Plan
Objective 3.4 Explain the importance of resilience and recovery in security architecture
7  cards
Section 14.130 Redundant Site Considerations
Objective 3.4 Explain the importance of resilience and recovery in security architecture
12  cards
Section 14.131 Resilience and Recovery Testing
Objective 3.4 Explain the importance of resilience and recovery in security architecture
7  cards
Section 15.133 Security Architecture: On Premise vs The Cloud
Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources
19  cards
Section 15.134 Cloud Security
Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources
16  cards
Section 15.135 Virtualisation and Containerisation
Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources
11  cards
Section 15.136 Serverless
Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources
7  cards
Section 15.137 Microservices
Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources
9  cards
Section 15.138 Network Infrastructure
Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources
4  cards
Section 15.139 Software-defined Network (SDN)
Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources
5  cards
Section 15.140 Infrastructure as Code (IaC)
Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources
8  cards
Section 15.141 Centralised vs Decentralised Architectures
Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources
14  cards
Section 15.142 Internet of Things (IoT)
Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources
7  cards
Section 15.143 ICS and SCADA
Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources
13  cards
Section 15.144 Embedded Systems
Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources
10  cards
Section 16.146 Security Infrastructure: Ports and Protocols
Objective 3.2 Given a scenario, you must be able to apply security principles to secure enterprise architecture. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security
37  cards
Section 16.147 Firewalls
Objective 3.2 Given a scenario, you must be able to apply security principles to secure enterprise architecture. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security
11  cards
Section 16.148 Configuring Firewalls
Objective 3.2 Given a scenario, you must be able to apply security principles to secure enterprise architecture. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security
7  cards
Section 16.149 IDS and IPS
Objective 3.2 Given a scenario, you must be able to apply security principles to secure enterprise architecture. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security
9  cards
Section 16.150 Network Appliances
Objective 3.2 Given a scenario, you must be able to apply security principles to secure enterprise architecture. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security
5  cards
Section 16.151 Port Security
Objective 3.2 Given a scenario, you must be able to apply security principles to secure enterprise architecture. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security
13  cards
Section 16.152 Securing Network Communications
Objective 3.2 Given a scenario, you must be able to apply security principles to secure enterprise architecture. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security
19  cards
Section 16.153 SD-WAN and SASE
Objective 3.2 Given a scenario, you must be able to apply security principles to secure enterprise architecture. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security
11  cards
Section 16.154 Infrastructure Considerations
Objective 3.2 Given a scenario, you must be able to apply security principles to secure enterprise architecture. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security
7  cards
Section 16.155 Selecting Infrastructure Controls
Objective 3.2 Given a scenario, you must be able to apply security principles to secure enterprise architecture. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security
17  cards
Section 17.156 Identity and Access Management (IAM) Solutions
Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 4.6 Given a scenario, you must be able to implement and maintain identity and access management.
6  cards
Section 17.157 Identity and Access Management (IAM)
Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 4.6 Given a scenario, you must be able to implement and maintain identity and access management.
10  cards
Section 17.158 Multi-factor Authentication
Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 4.6 Given a scenario, you must be able to implement and maintain identity and access management.
11  cards
Section 17.159 Password Security
Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 4.6 Given a scenario, you must be able to implement and maintain identity and access management.
18  cards
Section 17.160 Password Attacks
Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 4.6 Given a scenario, you must be able to implement and maintain identity and access management.
9  cards
Section 17.161 Single Sign-On (SSO)
Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 4.6 Given a scenario, you must be able to implement and maintain identity and access management.
7  cards
Section 17.162 Federation
Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 4.6 Given a scenario, you must be able to implement and maintain identity and access management.
9  cards
Section 17.163 Privileged Access Management (PAM)
Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 4.6 Given a scenario, you must be able to implement and maintain identity and access management.
4  cards
Section 17.164 Access Control Models
Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 4.6 Given a scenario, you must be able to implement and maintain identity and access management.
7  cards
Section 17.165 Assigning Permissions
Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 4.6 Given a scenario, you must be able to implement and maintain identity and access management.
7  cards
Section 18.166 Vulnerabilities and Attacks
Objectives 2.2 Explain common threat vectors and attack strategies. Objectives 2.3 Explain various types of vulnerabilities Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 2.6 Given a scenario, you must be able to apply common security techniques to computing resources
2  cards
Section 18.167 Hardware Vulnerabilities
Objectives 2.2 Explain common threat vectors and attack strategies. Objectives 2.3 Explain various types of vulnerabilities Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 2.6 Given a scenario, you must be able to apply common security techniques to computing resources.
13  cards
Section 18.168 Bluetooth Vulnerabilities and Attacks
Objectives 2.2 Explain common threat vectors and attack strategies. Objectives 2.3 Explain various types of vulnerabilities Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 2.6 Given a scenario, you must be able to apply common security techniques to computing resources.
16  cards
Section 18.169 Mobile Vulnerabilities and Attacks
Objectives 2.2 Explain common threat vectors and attack strategies. Objectives 2.3 Explain various types of vulnerabilities Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 2.6 Given a scenario, you must be able to apply common security techniques to computing resources.
7  cards
Section 18.170 Zero-day Vulnerabilities
Objectives 2.2 Explain common threat vectors and attack strategies. Objectives 2.3 Explain various types of vulnerabilities Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 2.6 Given a scenario, you must be able to apply common security techniques to computing resources.
4  cards
Section 18.171 Operating System Vulnerabilities
Objectives 2.2 Explain common threat vectors and attack strategies. Objectives 2.3 Explain various types of vulnerabilities Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 2.6 Given a scenario, you must be able to apply common security techniques to computing resources.
6  cards
Section 18.172 SQL and XML Injections
Objectives 2.2 Explain common threat vectors and attack strategies. Objectives 2.3 Explain various types of vulnerabilities Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 2.6 Given a scenario, you must be able to apply common security techniques to computing resources.
10  cards
Section 18.174 XSS and XSRF
Objectives 2.2 Explain common threat vectors and attack strategies. Objectives 2.3 Explain various types of vulnerabilities Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 2.6 Given a scenario, you must be able to apply common security techniques to computing resources.
18  cards
Section 18.175 Buffer Overflow
Objectives 2.2 Explain common threat vectors and attack strategies. Objectives 2.3 Explain various types of vulnerabilities Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 2.6 Given a scenario, you must be able to apply common security techniques to computing resources.
6  cards
Section 18.176 Race Conditions
Objectives 2.2 Explain common threat vectors and attack strategies. Objectives 2.3 Explain various types of vulnerabilities Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 2.6 Given a scenario, you must be able to apply common security techniques to computing resources.
9  cards
Section 19.178 Malicious Activity: and Distributed Denial of Service
Objective 2.4 Given a scenario, you must be able to analyse indicators of malicious activity
14  cards
Section 19.179 Domain Name System (DNS) Attacks
Objective 2.4 Given a scenario, you must be able to analyse indicators of malicious activity
6  cards
Section 19.180 Directory Traversal Attack
Objective 2.4 Given a scenario, you must be able to analyse indicators of malicious activity
5  cards
Section 19.181 Execution and Escalation Attacks
Objective 2.4 Given a scenario, you must be able to analyse indicators of malicious activity
11  cards
Section 19.182 Replay Attacks
Objective 2.4 Given a scenario, you must be able to analyse indicators of malicious activity
5  cards
Section 19.183 Session Hijacking
Objective 2.4 Given a scenario, you must be able to analyse indicators of malicious activity
7  cards
Section 19.184 On-path Attacks
Objective 2.4 Given a scenario, you must be able to analyse indicators of malicious activity
10  cards
Section 19.185 Injection Attacks
Objective 2.4 Given a scenario, you must be able to analyse indicators of malicious activity
4  cards
Section 19.186 Indicators of compromise (IoC)
Objective 2.4 Given a scenario, you must be able to analyse indicators of malicious activity
10  cards
Section 20.188 Hardening: and Changing Default Configurations
Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
4  cards
Section 20.189 Restricting Applications
Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
8  cards
Section 20.190 Unnecessary Services
Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
1  cards
Section 20.191 Trusted Operating Systems
Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
5  cards
Section 20.192 Updates and Patches
Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
6  cards
Section 20.193 Patch Management
Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
5  cards
Section 20.194 Group Policies
Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
8  cards
Section 20.195 SELinux Policies
Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
17  cards
Section 20.196 Data Encryption Levels
Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
7  cards
Section 20.197 Secure Baselines
Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
6  cards
Section 21.199 Security Techniques: and Wireless Infrastructure Security
Objective 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
7  cards
Section 21. 200 Wireless Security Settings
Objective 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
18  cards
Section 21.201 Application Security
Objective 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
7  cards
Section 21.202 Network Access Control (NAC)
Objective 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
9  cards
Section 21.203 Web and DNS Filtering
Objective 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
8  cards
Section 21.204 Email Secuirty
Objective 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
9  cards
Section 21.205 Endpoint Detection and Response
Objective 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
10  cards
Section 21.206 User Behaviour Analytics
Objective 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
6  cards
Section 21.207 Selecting Secure Protocols
Objective 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
8  cards
Section 22.209 Vulnerability Management: & Identifying Vulnerabilities
Objective 4.3 Explain various activities associated with vulnerability management
13  cards
Section 22.210 Threat Intelligence Feeds
Objective 4.3 Explain various activities associated with vulnerability management
7  cards
Section 22.211 Responsible Disclosure Programs
Objective 4.3 Explain various activities associated with vulnerability management
3  cards
Section 22.212 Analysing Vulnerabilities
Objective 4.3 Explain various activities associated with vulnerability management
11  cards
Section 22.213 Conducting Vulnerability Scans
Objective 4.3 Explain various activities associated with vulnerability management
1  cards
Section 22.214 Assessing Vulnerability Scan Reports
Objective 4.3 Explain various activities associated with vulnerability management
1  cards
Section 22.215 Vulnerability Response and Remediation
Objective 4.3 Explain various activities associated with vulnerability management
6  cards
Section 22.216 Validating Vulnerability Remediation
Objective 4.3 Explain various activities associated with vulnerability management
7  cards
Section 22.217 Vulnerability Reporting
Objective 4.3 Explain various activities associated with vulnerability management
5  cards
Section 23.219 Alerting and Monitoring: & Monitoring Resources
Objective 4.4 Explain security alerting and monitoring concepts and tools
11  cards
Section 23.220 Alerting and Monitoring Activities
Objective 4.4 Explain security alerting and monitoring concepts and tools
11  cards
Section 23.221 Simple Network Management Protocol (SNMP)
Objective 4.4 Explain security alerting and monitoring concepts and tools
14  cards
Section 23.222 Security Information and Event Management (SIEM)
Objective 4.4 Explain security alerting and monitoring concepts and tools
10  cards
Section 23.223 Data from Security Tools
Objective 4.4 Explain security alerting and monitoring concepts and tools
7  cards
Section 23.224 Security Content Automation and Protocol (SCAP)
Objective 4.4 Explain security alerting and monitoring concepts and tools
12  cards
Section 23.225 Network and Flow Analysis
Objective 4.4 Explain security alerting and monitoring concepts and tools
12  cards
Section 23.226 Single Pane of Glass
Objective 4.4 Explain security alerting and monitoring concepts and tools
7  cards
Section 24.228 Incident Response: & Incident Response Process
Objective 4.8 Explain appropriate incident response activities
18  cards
Section 24.229 Threat Hunting
Objective 4.8 Explain appropriate incident response activities
6  cards
Section 24.230 Root Cause Analysis
Objective 4.8 Explain appropriate incident response activities
7  cards
Section 24.231 Incident Response Training and Testing
Objective 4.8 Explain appropriate incident response activities
5  cards
Section 24.232 Digital Forensic Procedures
Objective 4.8 Explain appropriate incident response activities
11  cards
Section 24.233 Data Collection Procedures
Objective 4.8 Explain appropriate incident response activities
6  cards
Section 24.234 Disk Imaging and Analysis
Objective 4.8 Explain appropriate incident response activities
1  cards
Section 25.236 Investigating an Incident: & Investigate data
Objective 4.9 Given a scenario, you must be able to use data sources to support an investigation
15  cards
Section 25.237 Dashboards
Objective 4.9 Given a scenario, you must be able to use data sources to support an investigation
3  cards
Section 25.238 Automated Reports
Objective 4.9 Given a scenario, you must be able to use data sources to support an investigation
12  cards
Section 25.239 Vulnerability Scans
Objective 4.9 Given a scenario, you must be able to use data sources to support an investigation
5  cards
Section 25.240 Packet Captures
Objective 4.9 Given a scenario, you must be able to use data sources to support an investigation
2  cards
Section 25.241 Firewall Logs
Objective 4.9 Given a scenario, you must be able to use data sources to support an investigation
1  cards
Section 25.242 Application Logs
Objective 4.9 Given a scenario, you must be able to use data sources to support an investigation
0  cards
Section 25.243 Endpoint Log
Objective 4.9 Given a scenario, you must be able to use data sources to support an investigation
0  cards
Section 25.244 OS-specific Security Logs
Objective 4.9 Given a scenario, you must be able to use data sources to support an investigation
0  cards
Section 25.245 IPS/IDS Logs
Objective 4.9 Given a scenario, you must be able to use data sources to support an investigation
1  cards
Section 25.246 Network Logs
Objective 4.9 Given a scenario, you must be able to use data sources to support an investigation
0  cards
Section 25.247 Metadata
Objective 4.9 Given a scenario, you must be able to use data sources to support an investigation
2  cards
Section 26.248 Automation and Orchestration
Objective 4.7 Explain the importance of automation and orchestration related to secure operations
6  cards
Section 26.249 When to Automate and Orchestrate
Objective 4.7 Explain the importance of automation and orchestration related to secure operations
6  cards
Section 26.250 Benefits of Automation and Orchestration
Objective 4.7 Explain the importance of automation and orchestration related to secure operations
8  cards
Section 26.251 Automating Support Tickets
Objective 4.7 Explain the importance of automation and orchestration related to secure operations
5  cards
Section 26.252 Automating Onboarding
Objective 4.7 Explain the importance of automation and orchestration related to secure operations
7  cards
Section 26.253 Automating Security
Objective 4.7 Explain the importance of automation and orchestration related to secure operations
5  cards
Section 26.254 Automating Application Development
Objective 4.7 Explain the importance of automation and orchestration related to secure operations
5  cards
Section 26.255 Integrations and APIs
Objective 4.7 Explain the importance of automation and orchestration related to secure operations
7  cards
Section 27.257 Security Awareness: & Recognising Insider Threats
Objective 5.6 Given a scenario, you must be able to implement security awareness practices
7  cards
Section 27.258 Objective 5.6 Password Managers
Objective 5.6 Given a scenario, you must be able to implement security awareness practices
4  cards
Section 27.259 Avoiding Social Engineering
Objective 5.6 Given a scenario, you must be able to implement security awareness practices
10  cards
Section 27.260 Policy and Handbooks
Objective 5.6 Given a scenario, you must be able to implement security awareness practices
10  cards
Section 27.261 Remote and Hybrid Work Environments
Objective 5.6 Given a scenario, you must be able to implement security awareness practices
4  cards
Section 27.262 Creating a Culture of Security
Objective 5.6 Given a scenario, you must be able to implement security awareness practices
7  cards

More about
CompTIA Security + (SY0-701)

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Amreek Paul's CompTIA Security + (SY0-701) flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security+ (SY0-701)
  • 30 decks
  • 918 flashcards
  • 177 learners
Decks: Acronym List A D, Acronym E M, Acronym N T, And more!
Security+ (SY0-701)
  • 22 decks
  • 1650 flashcards
  • 269 learners
Decks: Lesson 1 Summarize Fundamental Security, Lesson 2 Compare Threat Types, Lesson 3 Explain Cryptographic Solutions, And more!
Make Flashcards