This class was created by Brainscape user Barbara Golson. Visit their profile to learn more about the creator.

Decks in this class (33)

Module 1 Introduction to Cybersecurity
Rogue access point,
Spyware,
Adware
126  cards
Quiz Questions
Which of the following standards ...,
What organizational plan is devel...,
What type of information could in...
60  cards
Security +
What is cybersecurity or security,
What is cloud security,
What is a internal threat
13  cards
Microsoft
0  cards
Ports
Which ftp port is responsible for...,
Which ftp port is responsible for...,
The secure shell ssh protocol uses
39  cards
Network
What is a network,
What is the difference between a ...,
What devices are typically includ...
35  cards
Network Fundamentals
What is the client server model,
Identify several common network p...,
What is the function of a network...
43  cards
Switch and IOS Fundamentals
What layer does a switch operate at,
What is a forwarding decision,
What commend displays the mac add...
35  cards
Switch Security
What is port security,
What is mac spoofing,
What is cam table overflow
7  cards
IP & Routing Concepts
Which mathematical base does the ...,
What is a bit,
How many bits form a byte
40  cards
IP Interview questions
Explain the concept of tcp ip,
How many layers does tcp ip archi...,
What is a ip datagram
17  cards
Network exam interview questions
What is a network,
What is a node,
What is network topology
7  cards
Subnetting Concepts
What is subnetting,
What is a broadcast domain,
What is cidr
5  cards
IPv4 & IPv6 Static Routing
How does a router operate,
What is a remote network,
What icmp message is received of ...
11  cards
Dynamic Routing
What is dynamic routing,
What is a metric,
What is rip
19  cards
VLANs and Trunk
What is a vlan,
What are the benefits of vlans,
What is a vlan id
28  cards
DHCP
What is dhcp,
Dhcp supports three types of addr...,
Dhcp and its messages are based o...
14  cards
NAT, CDP, LLDP
Nat addresses concerns over the d...,
What technique allows for inbound...,
The total number of ipv4 addresse...
36  cards
Final Exam Practice Test Questions
A client was connected to a netwo...,
Connecting computers to a network...,
A network administrator identifie...
12  cards
Cloud Security
What is cloud,
What is cloud computing,
What are the benefits of cloud co...
64  cards
Identity & Access Management (IAM)
What is iam,
Does iam service for aws require ...
2  cards
Linux
True or false kali is based on de...,
True or false centos is based on ...,
Does debian contain a gui environ...
67  cards
Linux Exam Questions
1 a service in the server is gene...,
2 a new linux user saved an impor...,
A linux user downloaded a new bin...
15  cards
Security + Test Questions Examcompass #1
A social engineering technique wh...,
Which of the following answers re...,
The practice of using a telephone...
30  cards
Network Security
What is network security,
What is aaa,
What is local authentication
114  cards
Network Security Exam Review Questions
1 a company called topfix was att...,
2 to secure a connection to your ...,
3 the dot1x authentication proces...
11  cards
CIT Study Questions
What is endpoint security solution,
True or false endpoint security s...,
Sean who works as a network admin...
71  cards
CIT Exam Review Questions
David a cybersecurity researcher ...,
What is the name of the method th...,
A large company experienced leaka...
10  cards
Cisco CyberOps Associate Study Questions
What does it mean when access to ...,
In the field of information secur...,
Which of the following refers to ...
121  cards
SOC Interview Questions and Answers
1 what is the cia triad,
2 what is a siem what are some of...,
3 what are the differences betwee...
41  cards
Python Exam Review
If an object s reference count is...,
All of the are true of variable i...,
The input function returns an obj...
71  cards
EH Review 1.3
Which establishment needs to be h...,
Why may cookies be stolen via xss...,
Which of the following is true re...
45  cards
DFIR Test Review
Let s build an ir team whom do we...,
Let s build an ir team whom do we...,
What types of things do we do in ...
55  cards

More about
cybersecurity

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Barbara Golson's Cybersecurity flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Cyber Security
  • 27 decks
  • 612 flashcards
  • 8 learners
Decks: Unit 2 Module 3, Unit 2 Module 4, Unit 3 Module 1, And more!
cybersecurity
  • 22 decks
  • 560 flashcards
  • 23 learners
Decks: Google Hacks, Reconnaissance, Sniffing And Evasion, And more!
IT Cybersecurity
  • 14 decks
  • 443 flashcards
  • 63 learners
Decks: A It Essentials Quiz 1, A It Essentials Quiz 2, A It Essentials Quiz 3, And more!
Cyber Security (CompTIA Security+)
  • 41 decks
  • 1670 flashcards
  • 5 learners
Decks: Chapter 1 Threats Attacks And Vulnerabil, Chapter 11 Social Engineering, Chapter 12 Attack Types, And more!
Make Flashcards