This class was created by Brainscape user Bob OBrien. Visit their profile to learn more about the creator.

Decks in this class (12)

Section 1: Understanding Security Fundamentals
What are the three components of ...,
Why might an inactive cctv camera...,
What does confidentiality mean 3
25  cards
Section 2: Implementing Public Key Infrastructure
What type of certificate does a c...,
If you are going to use a ca inte...,
If you want to carry out b2b acti...
59  cards
Section 3: Investigating Identity and Access Management
What is the most common form of a...,
When you purchase a new wireless ...,
What is password history 3
59  cards
Section 4: Exploring Virtualization and Cloud Concepts
In a cloud environment what is el...,
In which cloud environment would ...,
What cloud model would you not be...
41  cards
Section 5: Monitoring, Scanning and Penetration Testing
Which pen tester would be given s...,
Why would a shared account pose a...,
Which pen tester would be given n...
23  cards
Section 6: Understanding Secure and Insecure Protocols
What is the authentication protoc...,
Describe how ipsec tunnel mode wo...,
Describe how ipsec transport mode...
25  cards
Section 7: Delving into Network and Security Concepts
What is the purpose of a web appl...,
What is implicit deny and which t...,
What is the firewall that does co...
51  cards
Section 8: Securing Wireless and Mobile Solutions
What two groups of people might u...,
What is the difference between fa...,
What is the wap master password a...
27  cards
Section 9: Identifying Threats, Attacks and Vulnerabilities
If you install a freeware program...,
Describe how a fileless virus ope...,
How does an attacker carry out cr...
62  cards
Section 10: Governance, Risk, and Compliance
What is a vulnerability in relati...,
What is the purpose of bpa 2,
What is a multiparty risk 3
54  cards
Section 11: Managing Application Security
Name three types of mobile device...,
What is an embedded electronic sy...,
What is the purpose of a scada sy...
33  cards
Section 12: Dealing with Incident Response Procedures
What raid model has a minimum of ...,
What raid models has a minimum of...,
What is the difference between ra...
30  cards

More about
Cyber

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Bob OBrien's Cyber flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Cyber Security
  • 19 decks
  • 2738 flashcards
  • 137 learners
Decks: Security Risk Management Srm, Security Assessment And Testing Ant, Software Development Security Dev, And more!
Cyber-Security
  • 23 decks
  • 663 flashcards
  • 421 learners
Decks: Computer Fraud And Abuse, Wireless, Radio Frequency Fundamentals, And more!
Cyber Security
  • 13 decks
  • 1845 flashcards
  • 19 learners
Decks: Google Cyber Security Glossary All, Tryhackme Terms, Foundations Of Cybersecurity Module 1, And more!
Cyber Security
  • 27 decks
  • 612 flashcards
  • 12 learners
Decks: Unit 2 Module 3, Unit 2 Module 4, Unit 3 Module 1, And more!
Make Flashcards