This class was created by Brainscape user paulo guiao. Visit their profile to learn more about the creator.

Decks in this class (26)

<<<< 1.0 THREAT MANAGEMENT >>>>
0  cards
1.1 Threat Management
What is a public cloud,
What does os fingerprinting involve,
What are the three main protocols...
31  cards
1.2 Threat Management
What is lightweight extensible au...,
Which type of analysis involves i...,
Which wireless protocol provides ...
22  cards
1.3 Threat Management
What is the most secure implement...,
What is the name for a hole in th...,
Which malicious software infects ...
57  cards
1.4 Threat Management
According to the cysa objectives ...,
Is a dhcp server normally placed ...,
What is meant by the term exploit...
24  cards
<<<< 2.0 VULNERABILITY MANAGEMENT >>>>
0  cards
2.1 Vulnerability Management
What should you consult to identi...,
What is a flaw loophole or weakne...,
Which scan has less of an impact ...
38  cards
2.2 Vulnerability Management
What are the three possible value...,
Which value of the authentication...,
Which cvss metric describes the a...
33  cards
2.3 Vulnerability Management
In which type of attack is a user...,
What is meant by vm escape,
Which type of system does a stuxn...
56  cards
<<<< 3.0 CYBER INCIDENT RESPONSE >>>>
0  cards
3.1 Cyber Incident Response
What does the acronym mtd denote,
What is mtbf,
What are the four types of person...
18  cards
3.2 Cyber Incident Response
What is the best method to preser...,
What is the order of volatility f...,
What are the four documents forms...
19  cards
3.3 Cyber Incident Response
Which stakeholder in the incident...,
Which stakeholder in the incident...,
What are the four main stakeholde...
8  cards
3.4 Cyber Incident Response
What is data exfiltration,
What should you do if you discove...,
What happens in vertical privileg...
11  cards
3.5 Cyber Incident Response
What is the best way to determine...,
Why should a first responder be f...,
Which eradication technique reins...
17  cards
<<<< 4.0 SECURITY ARCHITECTURE AND TOOL SETS >>>>
0  cards
4.1 Security Architecture and Tool Sets
Which audit category will audit a...,
What is another term for logical ...,
Which type of controls dictates h...
36  cards
4.2 Security Architecture and Tool Sets
What is the top most level of the...,
What is the primary function of ldap,
What are flood guards
45  cards
4.3 Security Architecture and Tool Sets
What are the two types of ciphers,
What is most commonly used to pro...,
Which key is used to decrypt a di...
18  cards
4.4 Security Architecture and Tool Sets
What is the purpose of filters on...,
What is the purpose of sandbox in...,
Which error condition arises beca...
31  cards
4.5 Security Architecture and Tool Sets
What are the five monitoring tool...,
What is wireshark,
What are the three ips tools
38  cards
1.0 Threat Management
What is a public cloud,
What does os fingerprinting involve,
What are the three main protocols...
134  cards
2.0 Vulnerability Management
What should you consult to identi...,
What is a flaw loophole or weakne...,
Which scan has less of an impact ...
127  cards
3.0 Cyber Incident Response
What does the acronym mtd denote,
What is mtbf,
What are the four types of person...
73  cards
4.0 Security Architecture and Tool Sets
Which audit category will audit a...,
What is another term for logical ...,
Which type of controls dictates h...
168  cards
ALL
What is a public cloud,
What does os fingerprinting involve,
What are the three main protocols...
502  cards

More about
CySA+ CS0-001

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study paulo guiao's CySA+ CS0-001 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Comptia CYSA+
  • 37 decks
  • 1033 flashcards
  • 67 learners
Decks: Threat Intelligence Sharing, Classifying Threats, Network Forensics, And more!
CYSA+
  • 14 decks
  • 513 flashcards
  • 85 learners
Decks: Chapter 1 Defending Against Cybersecurit, Chapter 2 Reconnaissance And Intelligenc, Chapter 3 Designing A Vulnerability Mana, And more!
CySA+
  • 9 decks
  • 405 flashcards
  • 55 learners
Decks: Lesson 1, Lesson 2 Using Threat Intelligence, Lesson 3 Reconnaissance And Intelligence, And more!
CySA+ 003
  • 14 decks
  • 504 flashcards
  • 53 learners
Decks: Chapter 01 Today S Cybersecurity Analyst, Chapter 02 System And Network Architectu, Chapter 03 Malicious Activity, And more!
Make Flashcards