This class was created by Brainscape user elvis sanchez. Visit their profile to learn more about the creator.

Decks in this class (40)

1.1 Compare and contrast different types of social engineering techniques.
An attacker registers a domain na...,
The attacker steals a domain name...,
Domain name server dns exploit th...
7  cards
1.2 Given a scenario, analyze potential indicators to determine the type of attack.
Class of ransomware that attempts...,
Type of trojan malware that tries...,
Spawn browser pop up windows as w...
13  cards
1.3 Given a scenario, analyze potential indicators associated with application attacks.
Cross site request forgery xsrf,
Stored cross site scripting xss,
Document object model dom based xss
19  cards
1.4 Given a scenario, analyze potential indicators associated with network attacks.
What is a rogue access point and ...,
What is a wireless evil twin,
What is bluejacking
21  cards
1.5 Explain different threat actors, vectors, and intelligence sources.
What is an isac,
What is dns harvesting,
What is apt
9  cards
1.6 Explain the security concerns associated with various types of vulnerabilities.
Data exfiltration,
What are some common vulnerabilities
2  cards
1.7 Summarize the techniques used in security assessments.
Non intrusive scan,
Intrusive scan,
What searches for known web explo...
13  cards
1.8 Explain the techniques used in penetration testing.
During a pentest which team acts ...,
Which team is responsible for set...,
Which
18  cards
2.1 Explain the importance of security concepts in an enterprise environment.
Hot site,
Cold site,
Warm site
20  cards
2.2 Summarize virtualization and cloud computing concepts.
Separates data and control planes...,
Offers a company configurable ope...,
Full service product and is pay a...
11  cards
2.3 Summarize secure application development, deployment, and automation concepts.
Elasticity,
Scalability,
Containers
17  cards
2.4 Summarize authentication and authorization design concepts.
Attestation,
Far,
Frr
10  cards
2.5 Given a scenario, implement cybersecurity resilience.
Raid 0,
Raid 1,
Raid 5
35  cards
2.6 Explain the security implications of embedded and specialized systems.
Embedded system,
Soc,
Fpga
29  cards
2.7 Explain the importance of physical security controls.
Pulverizing,
Pulping,
Degaussing
7  cards
2.8 Summarize the basics of cryptographic concepts.
Non repudiation,
Authentication,
It
35  cards
3.1 Given a scenario, implement secure protocols.
Ah protocol,
Ipsec,
Tunnel mode
32  cards
3.2 Given a scenario, implement host or application security solutions.
Tpm,
Hsm,
Hids
22  cards
3.3 Given a scenario, implement secure network designs.
Gather information to determine i...,
Aggregation switch,
Active passive configuration
24  cards
3.4 Given a scenario, install and configure wireless security settings.
Eap tls,
Sae,
Peap
8  cards
3.5 Given a scenario, implement secure mobile solutions.3.6 Given a scenario, apply cybersecurity solutions to the cloud.
What features of airwatch can ben...,
Cyod,
Byod
19  cards
3.8 Given a scenario, implement authentication and authorization solutions.
Tacas,
Radius,
8021x
12  cards
3.9 Given a scenario, implement public key infrastructure.
Hpkp,
Crl,
Csr
12  cards
4.1 Given a scenario, use the appropriate tool to assess organizational security.
Traceroute,
Give two common ways to query or ...,
Nslookup
48  cards
4.2 Summarize the importance of policies, processes, and procedures for incident response.
Security incidents,
Nist sp800 61,
Preparing for an incident
22  cards
4.4 Given an incident, apply mitigation techniques or controls to secure an environment.
Endpoint,
Approved list,
Block list
16  cards
4.3 Given an incident, utilize appropriate data sources to support an investigation.
What does a vulnerability scanner...,
Siem,
How does a siem get its data
26  cards
4.5 Explain the key aspects of digital forensics.
Digital forensic,
Legal hold,
Capture video
8  cards
5.1 Compare and contrast various types of controls.
What are the three categories of ...,
What is a managerial control,
What is an operational control
12  cards
5.2 Explain importance of applicable regulations, standards or frameworks...
Gdpr,
Pci dss,
Cis
20  cards
5.3 Explain the importance of policies to organizational security.
What is an acceptable use policy,
What is least privilege,
What are some ways to train users
30  cards
5.4 Summarize risk management processes and concepts.
Control risk,
Residual risk,
Inherent risk
19  cards
5.5 Explain privacy and sensitive data concepts in relation to security.
Information life cycle,
Pia,
Proprietary
20  cards
Failed on Practice exam
Context aware authentication,
What is the mechanism for restori...,
What entity is responsible for va...
23  cards
Failed on 2nd practice exam
A cloud network hub that allows u...,
Which value is the result of a qu...,
Which control types does a system...
24  cards
Failed Exam 3
0  cards
Failed Exam 3
0  cards
Controls
0  cards
Cryptography
0  cards
PKI
0  cards

More about
Security

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study elvis sanchez's Security flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
Indicative Conjugations
  • 1 decks
  • 477 flashcards
  • 1 learners
Decks: 20 Main Verbs, And more!
LGS OCR A-Level Chemistry A
  • 33 decks
  • 1208 flashcards
  • 293 learners
Decks: Chapter 2 Atoms Ions And Compounds, Chapter 3 Amount Of Substance, Chapter 4 Acids And Redox, And more!
Make Flashcards