This class was created by Brainscape user Hyun Rim. Visit their profile to learn more about the creator.

Decks in this class (56)

CH01 Overview of Security
You are at the doctor s office an...,
You have just walked up to the ba...,
You are in the kitchen cooking di...
6  cards
CH02 Malware
A user has reported that their wo...,
On your lunch break you walked do...,
A computer is infected with a pie...
5  cards
CH03 Malware Infection
Your company s security operation...,
The security operations center di...,
In which type of attack does the ...
4  cards
CH04 Security Applications and Devices
You have been investigating how a...,
Your company recently suffered a ...,
You are trying to select the best...
5  cards
CH05 Mobile Device Security
Which mobile device strategy is m...,
Your smartphone begins to receive...,
Tim a help desk technician receiv...
4  cards
CH06 Hardening
Which type of threat will patches...,
What should administrators perfor...,
Which of the following security c...
7  cards
CH07 Supply Chain Management
Which of the following best descr...,
Which of the following programs w...,
Following a root cause analysis o...
4  cards
CH08 Virtualization
What is the lowest layer bottom l...,
You need to determine the best wa...,
Which of the following vulnerabil...
4  cards
CH09 Application Security
A web developer wants to protect ...,
A user reports that every time th...,
Your company has created a baseli...
3  cards
CH10 Secure Software Development
You are reviewing the ids logs an...,
While conducting a penetration te...,
You are analyzing the siem for yo...
11  cards
CH11 Network Design
A supplier needs to connect sever...,
An analyst is reviewing the confi...,
Dion training allows its visiting...
5  cards
CH12 Perimeter Security
You have just received some unusu...,
You are trying to select the best...,
During a security audit you disco...
7  cards
CH13 Cloud Security
The pass certs fast corporation h...,
Which of the following would a vi...,
Daves company utilizes googles g ...
4  cards
CH14 Automation
Which term is used in software de...,
Which of the following utilizes a...,
Which type of system would classi...
3  cards
CH15 Network Attacks
Which of the following types of a...,
An analyst just completed a port ...,
Richard attempted to visit a webs...
5  cards
CH16 Securing Networks
You are installing a new wireless...,
Your home network is configured w...,
Which of the following is the lea...
7  cards
CH17 Physical Security
Which of the following physical s...,
You work for dion training as a p...,
The public library has had a rece...
3  cards
CH18 Facilities Security
Which of the following is not con...,
Syed is developing a vulnerabilit...,
An analyst is reviewing the logs ...
6  cards
CH19 Authentication
David noticed that port 3389 was ...,
Which of the following authentica...,
What access control model will a ...
8  cards
CH20 Access Control
Which of the following access con...,
Julie was just hired to conduct a...,
Marta s organization is concerned...
6  cards
CH21 Risk Assessment
After completing an assessment yo...,
Jamie s organization is attemptin...,
Dion training is concerned with t...
6  cards
CH22 Vulnerability Management
Which of the following command li...,
A cybersecurity analyst in your c...,
Nick is participating in a securi...
9  cards
CH23 Monitoring and Auditing
Which of the following protocols ...,
Which security tool is used to fa...,
You are conducting an intensive v...
5  cards
CH24 Cryptography
Which of the following cryptograp...,
Frank and john have started a sec...,
A company has recently experience...
10  cards
CH25 Hashing
Keith wants to validate the appli...,
Which of the following hashing al...,
In an effort to increase the secu...
3  cards
CH26 Public Key Infrastructure
Assuming that dion training trust...,
You just received an email from b...,
The digital certificate on the di...
4  cards
CH27 Security Protocols
A cybersecurity analyst is attemp...,
Which of the protocols listed is ...,
Your company just installed a new...
5  cards
CH28 Planning for the Worst
You are configuring a raid drive ...,
Dion training has performed an as...,
Karen lives in an area that is pr...
5  cards
CH29 Social Engineering
Which attack method is most likel...,
Which type of threat actor can ac...,
Several users have contacted the ...
7  cards
CH30 Policies and Procedures
Which of the following is a senio...,
Your company is setting up a syst...,
Your company is expanding its ope...
15  cards
CH31 Incident Response and Forensics
During which incident response ph...,
You are the first forensic analys...,
Which of the following is require...
8  cards
Practice Exam 00
An attacker uses the nslookup int...,
Which of the following methods is...,
Which of the following hashing al...
90  cards
Practice Exam 01
A cybersecurity analyst is review...,
Which of the following is the lea...,
Which of the following attacks wo...
80  cards
Practice Exam 02
Dion training utilizes a wired ne...,
Dion training wants to ensure tha...,
The digital certificate on the di...
80  cards
Practice Exam 03
0  cards
Practice Exam 04
0  cards
Practice Exam 05
0  cards
Practice Exam 06
0  cards
Sy06 Exam Braindumps
A user is attempting to navigate ...,
Which of the following tools is e...,
A chief security officer is looki...
849  cards
Sy06 Exam Braindumps 1-50
A user is attempting to navigate ...,
Which of the following tools is e...,
A chief security officer is looki...
50  cards
Sy06 Exam Braindumps 51-100
Which of the following organizati...,
An organization discovered files ...,
A security analyst has identified...
50  cards
Sy06 Exam Braindumps 101-150
A dba reports that several produc...,
Digital signatures use asymmetric...,
A security engineer was assigned ...
50  cards
Sy06 Exam Braindumps 151-200
A soc operator is analyzing a log...,
A security incident has been reso...,
Hotspot drag and drop is not supp...
50  cards
Sy06 Exam Braindumps 201-250
Which of the following prevents a...,
A user reports falling for a phis...,
An attacker has determined the be...
50  cards
Sy06 Exam Braindumps 251-300
Which of the following environmen...,
An analyst receives multiple aler...,
Which of the following in the inc...
50  cards
Sy06 Exam Braindumps 301-350
A security analyst is investigati...,
A security analyst discovers that...,
Joe an employee receives an email...
50  cards
Sy06 Exam Braindumps 351-400
A new security engineer has start...,
An enterprise has hired an outsid...,
A network engineer and a security...
50  cards
Sy06 Exam Braindumps 401-450
A security analyst is reviewing l...,
A company is launching a website ...,
An organization would like to rem...
50  cards
Sy06 Exam Braindumps 451-500
A small local company experienced...,
A security investigation revealed...,
Which of the following roles woul...
50  cards
Sy06 Exam Braindumps 501-550
A government organization is deve...,
A company s help desk has receive...,
Which of the following can best p...
50  cards
Sy06 Exam Braindumps 551-600
A security analyst was asked to e...,
A company s chief information sec...,
Which of the following provides a...
50  cards
Sy06 Exam Braindumps 601-650
Which of the following has been i...,
An attacker tricks a user into pr...,
A large bank with two geographica...
50  cards
Sy06 Exam Braindumps 651-700
A security engineer is reviewing ...,
A user recently entered a usernam...,
A recent audit uncovered a key fi...
50  cards
Sy06 Exam Braindumps 701-750
A recent malware outbreak across ...,
An organization is building a sin...,
A new company wants to avoid chan...
50  cards
Sy06 Exam Braindumps 751-800
In which of the following scenari...,
A new vulnerability enables a typ...,
A systems administrator is auditi...
50  cards
Sy06 Exam Braindumps 801-850
A penetration test revealed that ...,
Which of the following is the mos...,
Which of the following would best...
49  cards

More about
CompTIA Security Tests

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Hyun Rim's CompTIA Security Tests flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security+ Practice Tests: Exa...
  • 30 decks
  • 924 flashcards
  • 366 learners
Decks: Threats Attacks And Vulnerabilities 1, Threats Attacks And Vulnerabilities 2, Threats Attacks And Vulnerabilities 3, And more!
CompTIA Security+ (SY0-601)
  • 35 decks
  • 745 flashcards
  • 2107 learners
Decks: Security Overview, Malware, Malware Infections, And more!
CompTIA A+
  • 28 decks
  • 3865 flashcards
  • 641 learners
Decks: Chapter 1 Mobile Devices Mc, Chapter 1 Mobile Devices, Chapter 1 Mobile Devices Key Terms, And more!
Comp TIA Chapter Reviews
  • 28 decks
  • 758 flashcards
  • 21 learners
Decks: Chapter 2 Review Operational Procedures, Chapter 3 Review The Visible Computer, Chapter 4 Review Microprocessors, And more!
Make Flashcards