This class was created by Brainscape user Yarnell Dixon. Visit their profile to learn more about the creator.

Decks in this class (36)

Designing your Cybersecurity Infrastructure Week 1
What involves tailoring the timin...,
Which component of endpoint secur...,
Which clamav configuration file a...
10  cards
Designing your Cybersecurity Infrastructure Week 2
Which protocol is responsible for...,
Which components make up the siem...,
Dns spoofing redirects network tr...
10  cards
Designing your Cybersecurity Infrastructure Week 3
Modbus is a protocol specifically...,
What does the correlation process...,
The owasp top 10 list is a list o...
10  cards
Designing your Cybersecurity Infrastructure Week 4
What is a key principle of networ...,
What is the primary function of a...,
What is the primary function of n...
10  cards
Designing your Cybersecurity Infrastructure Final Assessment
Air gapped environments are conne...,
What is the role of a smart gatew...,
In the context of patch managemen...
20  cards
Computer Networking Fundamentals Week 1
What are the differences between ...,
Which of the following best descr...,
What is the difference between ph...
10  cards
Computer Networking Fundamentals Week 2
Cidr is used to further subnet wh...,
Ipv4 uses 32 bit addresses while ...,
What is the structure and format ...
10  cards
Computer Networking Fundamentals Week 3
What are the three violation mode...,
How is cisco ios commonly used fo...,
In a scenario involving a port se...
10  cards
Computer Networking Fundamentals Week 4
Which statement best describes th...,
Which statement best defines netw...,
Which statement best describes th...
10  cards
Computer Networking Fundamentals Final Assessment
How do ip addresses and subnet ma...,
What is the structure of ipv6 add...,
What is the structure and format ...
20  cards
Securing Your Network Week 1
The approach that focuses on cont...,
What is the primary goal of netwo...,
A forward proxy is a type of prox...
10  cards
Securing your Network Week 2
Which wireshark feature allows yo...,
The noc team primarily interacts ...,
What key statistical categories d...
10  cards
Securing your Network Week 3
Which vpn deployment option is sp...,
Land attacks target systems with ...,
Which of the following is a measu...
10  cards
Securing your Network Week 4
Which detection method analyzes p...,
For security most firewalls will ...,
Which of the following are charac...
10  cards
Securing your Network Final Assessment
What is the primary goal of netwo...,
For security most firewalls will ...,
A web application firewall waf is...
20  cards
Integrating your Infrastructure Security Week 1
Which folder contains all directo...,
Jacob found a text file that cont...,
Which of the following commands i...
10  cards
Integrating you Infrastructure Security Week 2
Which file contains information a...,
Which command is used to update t...,
What is the primary source list f...
10  cards
Integrating you Infrastructure Security Week 3
Containers in the cloud are scala...,
Which services are part of amazon...,
Which service does aws provide fo...
10  cards
Integrating you Infrastructure Security Week 4
Which of the following is not a p...,
Which of the following are valid ...,
A hello true in the code above wh...
10  cards
Integrating you Infrastructure Security Final Assessment
What is the primary function of c...,
Which of the following commands l...,
What does the chmod command do 3
20  cards
Social Engineering and Ethical Hacking Week 1
Social engineering relies heavily...,
With appropriate scripts nmap can...,
The principle of ensures that inf...
10  cards
Social Engineering and Ethical Hacking Week 2
Which of the following platforms ...,
Is a technique that utilizes adva...,
Which of the following are method...
10  cards
Social Engineering and Ethical Hacking Week 3
Vpns can only be used on computer...,
A shell may be preferred by an at...,
Which nodes are part of the tor n...
10  cards
Social Engineering and Ethical Hacking Week 4
Which function is commonly used i...,
Which of the following are common...,
The intruder tool in burp suite i...
10  cards
Social Engineering and Ethical Hacking Final Assessment
0  cards
Microsoft Security System Administration Week 1
Select all of the commands that w...,
Which element of the cia triad is...,
Aduc is identical to ad 3
10  cards
Microsoft Security System Administration Week 2
Which zone type has the master co...,
What is dns resolution 2,
To install a service within ad ds...
10  cards
Microsoft Security System Administration Week 3
Why is ensuring correct dhcp netw...,
What is the purpose of in windows...,
In ntfs permissions the list fold...
10  cards
Microsoft Security System Administration Week 4
What is bitlocker 1,
What is the purpose of local secu...,
What are the two primary types of...
10  cards
Microsoft Security System Administration Final Assessment
0  cards
Incident Response and Digital Forensics Week 1
What is the primary objective of ...,
Incident response ir primarily fo...,
Incidents are always detected as ...
10  cards
Incident Response and Digital Forensics Week 2
Recovery in incident response onl...,
Which of the following factors sh...,
What risk is associated with the ...
10  cards
Incident Response and Digital Forensics Week 3
0  cards
Incident Response and Digital Forensics Week 4
In windows systems logs are saved...,
What is the main disadvantage of ...,
Which of the following are signs ...
10  cards
Incident Response and Digital Forensics Final Assessment
0  cards
Threat Hunting and Intelligence Week 1
What are the benefits of commerci...,
Which of the following is an assu...,
What are key aspects of threat hu...
10  cards

More about
CyberSecurity

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Yarnell Dixon's CyberSecurity flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?