This class was created by Brainscape user Brandon R. Visit their profile to learn more about the creator.

Decks in this class (28)

Cryptography
Which powershell cmdlet is used t...,
Hashing applies to which aspect o...,
You would like to securely genera...
10  cards
Managing Risk
Which items normally appear in a ...,
How does configuration management...,
Where are azure backup items stor...
12  cards
Public Key Infrastructure
What is required to allow the ena...,
Which pki component issues certif...,
You have installed a windows priv...
7  cards
Threat Intelligence
Which owasp top 10 item addresses...,
Which cvss score represents the m...,
Which type of security policy det...
10  cards
Authentication
Which server file stores ssh publ...,
Where are microsoft azure cloud u...,
You have configured group policy ...
11  cards
Authorization
You are configuring windows dynam...,
Which linux command can be used t...,
Which security principal strives ...
7  cards
Firewalls and Intrusion Detection
Your organization uses microsoft ...,
Which snort command starts the sn...,
Which additional feature does an ...
8  cards
Cloud Computing and Cybersecurity
Which authentication options are ...,
You are deploying a microsoft win...,
You have deployed a database in t...
10  cards
Data Security Standards
What prevents drones from operati...,
Which data sensitivity regulation...,
You would like to enforce data lo...
9  cards
Managing Network Settings
Your existing microsoft azure vir...,
You have created a new public ip ...,
You need to configure a default r...
9  cards
Virtualization and Container Security
Which detail differentiates appli...,
In which type of virtualization e...,
Which operating system component ...
5  cards
Security and Network Monitoring
Which role does machine learning ...,
Which description defines a false...,
What is the name of the default s...
10  cards
Vulnerability Scanning Tools and Techniques
Which parameter can be used with ...,
Which of the following applicatio...,
Which application can be used to ...
4  cards
Incident Response Communication and Reporting
Which federal organization overse...,
An incident report includes an ex...,
If an organization falls under th...
4  cards
Incident Response Management Techniques
Splunk is a software that is used...,
Which windows application is conf...,
What is the purpose of using hash...
4  cards
Later Phases of Incident Response
True or false the vulnerability m...,
Which of the following are method...,
What is the rebuilding of a syste...
5  cards
Business Continuity
Which cyber kill chain step relat...,
Which business continuity metric ...,
After eradicating threats using t...
10  cards
Logging and Monitoring
You have configured a honeypot li...,
Where are most linux logs located...,
Which is the default compression ...
8  cards
Malware
Which scripting language uses a s...,
What lets attackers know that inf...,
Which type of malware appears ben...
13  cards
Network Security Concepts
Which tcp ip protocol resolves ip...,
Which ipsec configuration provide...,
Which benefits can be derived fro...
12  cards
Analyzing Malicious Activity
What is the purpose of using the ...,
Which types of artifacts can an a...,
You are using a third party netwo...
7  cards
Malicious Techniques and Procedures
What can be done to mitigate rdp ...,
Which type of attack uses bots to...,
Which type of xss attack is remem...
13  cards
Vulnerability Data Analysis and Prioritization
Which of the following are part o...,
What is the purpose of the cvss c...,
Which vulnerabilities are measure...
4  cards
Vulnerability Patching and Attack Surface Management
What needs to be created in a win...,
Which command can be used to crea...,
What is the file extension for a ...
5  cards
OS Process Management
Which type of disk initialization...,
Which linux command can be used t...,
What is wrong with this linux com...
9  cards
Vulnerability and Penetration Testing
Which nmap command line parameter...,
Which command allows you to inter...,
Which term is commonly used to de...
12  cards
Hardening Techniques
What can be done to harden an isc...,
Which type of security solution i...,
Which windows server feature is u...
8  cards
Secure Coding and Digital Forensics
To what does the chain of custody...,
Which software development method...,
Which type of digital evidence is...
8  cards

More about
CySA+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Brandon R's CySA+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Comptia CYSA+
  • 37 decks
  • 1033 flashcards
  • 69 learners
Decks: Threat Intelligence Sharing, Classifying Threats, Network Forensics, And more!
CYSA+
  • 14 decks
  • 513 flashcards
  • 88 learners
Decks: Chapter 1 Defending Against Cybersecurit, Chapter 2 Reconnaissance And Intelligenc, Chapter 3 Designing A Vulnerability Mana, And more!
CySA+ CS0-001
  • 26 decks
  • 1506 flashcards
  • 86 learners
Decks: 10 Threat Management, 11 Threat Management, 12 Threat Management, And more!
CySA+
  • 9 decks
  • 405 flashcards
  • 55 learners
Decks: Lesson 1, Lesson 2 Using Threat Intelligence, Lesson 3 Reconnaissance And Intelligence, And more!
Make Flashcards