This class was created by Brainscape user Ken Archie. Visit their profile to learn more about the creator.

Decks in this class (27)

Unit 2 - Module 3
What are 3 common log sources,
A firewall log records what kind ...,
A network log records what 2 things
22  cards
Unit 2 - Module 4
Define playbook,
What does incident response mean,
What are the 6 incident responses...
11  cards
Unit 3 - Module 1
What is a network,
What s a local area network lan,
What is a wide area network wan
25  cards
Unit 3 - Module 2
What protocol allows two or more ...,
What is hypertext transfer protoc...,
What is a network protocol
46  cards
Unit 3 - Module 3
# ``````,
What is tcp transmisson control p...,
What do you call the dos attack t...
37  cards
Unit 4 - Module 1
What do you call the phyical comp...,
What are the 6 common operating s...,
What do you call an operating sys...
15  cards
Unit 4 - Module 2 - All About Linux
Is linux open sourced,
Linuxwhat is the command line int...,
What do you call the component of...
33  cards
General Cybersecurity Vocabulary
1what is a packet sniffer,
What s a dos attack,
What is a dns server and what doe...
7  cards
Unit 4 Module 3 - Non Commands
What do you call the concept of g...,
What are the 3 permissions that a...,
What are the 3 types of owners in...
7  cards
Unit 4 Module 3 - Linux Bash Commands
What command prints the working d...,
What command displays names of th...,
What command navigates between di...
30  cards
More In Depth Bash Commands
What command searches a specified...,
What sends the standard output of...
2  cards
Unit 4 Module 4 - SQL and Databses
What do you call an organized col...,
What do you call a structed datab...,
What do you call a column where e...
33  cards
Unit 5 - Module 1 - Assets
What do you call anything that ca...,
What are the 3 main things to thi...,
What do you call an item perceiev...
24  cards
Unit 5 - Module 2 - Safeguards
What do you call safeguards desig...,
What are the 3 types of security ...,
What is the protection of unautho...
51  cards
Unit 3 - Module 3 - Vulnerabilities
What do you call a weakness that ...,
What do you call a way of taking ...,
What would you call this list s m...
34  cards
Unit 5 - Module 4 - Theats
What do you call a manipulation t...,
These are the stages or what 1 pr...,
What social engineering tactic te...
38  cards
Unit 6 - Module 1 - Incident Response
What do you call an observable oc...,
What is a form of documentation u...,
What incident responce process is...
20  cards
Unit 6 - Module 2 - Network Analysis
What do you call the amount of da...,
What do you call data that s tran...,
What do you call observable evide...
18  cards
Unit 6 - Module 3 - Incident Detection and Verification
What do you call the prompt disco...,
What is called the investigation ...,
What phase is the incident respon...
26  cards
Unit 6 - Module 4 - IDS & SIEM Tools
What is a record of events that o...,
What is the process of examining ...,
What is the process of examining ...
31  cards
Unit 7 - Module 1 - Python Programming
What is the use of technology to ...,
Why is python used in cybersecuri...,
What is a process that can be use...
29  cards
Unit 7 - Module 2 - Python Functions, Modules and Libraries
What is a section of code that ca...,
What are functions that exist wit...,
What are functions that programme...
24  cards
Unit 7 - Module 3 - String Data
What is data consisting of an ord...,
What input converts objects into ...,
What function returns the number ...
19  cards
Unit 7 - Module 4 - Python Automation
What is a container that stores data,
What is a statement that evaluate...,
What is code that repeatedly exec...
14  cards
Unit 8 - Module 1 - Event and Incident Detection
What is the ability to evaluate r...,
What is data that is already acce...,
What is information that should b...
8  cards
Unit 8 - Module 2 - Escalation
What is the process of identifyin...,
What are 2 essential skills to es...,
What is an incident type that occ...
6  cards
Unit 8 - Modules 3, 4, 5 - Stakeholders, Reliable Sources
Who is an individual or group tha...,
2  cards

More about
cyber security

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Ken Archie's Cyber Security flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

cybersecurity
  • 22 decks
  • 560 flashcards
  • 24 learners
Decks: Google Hacks, Reconnaissance, Sniffing And Evasion, And more!
Cyber Security (CompTIA Security+)
  • 41 decks
  • 1670 flashcards
  • 4 learners
Decks: Chapter 1 Threats Attacks And Vulnerabil, Chapter 11 Social Engineering, Chapter 12 Attack Types, And more!
IT Cybersecurity
  • 14 decks
  • 443 flashcards
  • 62 learners
Decks: A It Essentials Quiz 1, A It Essentials Quiz 2, A It Essentials Quiz 3, And more!
Security+ Exam
  • 34 decks
  • 787 flashcards
  • 3 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
Make Flashcards