This class was created by Brainscape user elvis sanchez. Visit their profile to learn more about the creator.

Decks in this class (40)

1.1 Compare and contrast different types of social engineering techniques.
An attacker registers a domain na...,
The attacker steals a domain name...,
Domain name server dns exploit th...
7  cards
1.2 Given a scenario, analyze potential indicators to determine the type of attack.
Class of ransomware that attempts...,
Type of trojan malware that tries...,
Spawn browser pop up windows as w...
13  cards
1.3 Given a scenario, analyze potential indicators associated with application attacks.
Cross site client side request fo...,
Stored cross site scripting xss 2,
Document object model dom based x...
19  cards
1.4 Given a scenario, analyze potential indicators associated with network attacks.
What is a rogue access point and ...,
What is a wireless evil twin 2,
What is bluejacking 3
21  cards
1.5 Explain different threat actors, vectors, and intelligence sources.
What is an isac 1,
What is dns harvesting 1,
What is apt 2
9  cards
1.6 Explain the security concerns associated with various types of vulnerabilities.
Data exfiltration 1,
What are some common vulnerabilit...
2  cards
1.7 Summarize the techniques used in security assessments.
Non intrusive scan 1,
Intrusive scan 2,
What searches for known web explo...
13  cards
1.8 Explain the techniques used in penetration testing.
During a pentest which team acts ...,
During a pentest which team is re...,
During a pentest which team is on...
18  cards
2.1 Explain the importance of security concepts in an enterprise environment.
Hot site 1,
Cold site 2,
Warm site 3
20  cards
2.2 Summarize virtualization and cloud computing concepts.
Separates data and control planes...,
Offers a company configurable ope...,
Full service product and is pay a...
11  cards
2.3 Summarize secure application development, deployment, and automation concepts.
Elasticity 1,
Scalability 2,
Containers 3
17  cards
2.4 Summarize authentication and authorization design concepts.
Attestation 1,
Far 2,
Frr 3
10  cards
2.5 Given a scenario, implement cybersecurity resilience.
Raid 0 1,
Raid 1 2,
Raid 5 3
35  cards
2.6 Explain the security implications of embedded and specialized systems.
Embedded system 1,
Soc 2,
Fpga 3
29  cards
2.7 Explain the importance of physical security controls.
Pulverizing 1,
Pulping 2,
Degaussing 3
7  cards
2.8 Summarize the basics of cryptographic concepts.
Non repudiation 1,
Authentication 2,
Integrity 3
35  cards
3.1 Given a scenario, implement secure protocols.
Ah protocol 1,
Ipsec 2,
Tunnel mode 3
32  cards
3.2 Given a scenario, implement host or application security solutions.
Tpm 1,
Hsm 2,
Hids 3
22  cards
3.3 Given a scenario, implement secure network designs.
Gathers information to determine ...,
Aggregation switch 2,
Active passive configuration 3
24  cards
3.4 Given a scenario, install and configure wireless security settings.
Eap tls 1,
Sae 2,
Peap 3
8  cards
3.5 Given a scenario, implement secure mobile solutions.3.6 Given a scenario, apply cybersecurity solutions to the cloud.
What features of airwatch can ben...,
Cyod 2,
Byod 3
19  cards
3.8 Given a scenario, implement authentication and authorization solutions.
Tacas 1,
Radius 2,
8021x 3
12  cards
3.9 Given a scenario, implement public key infrastructure.
Hpkp 1,
Crl 2,
Csr 3
12  cards
4.1 Given a scenario, use the appropriate tool to assess organizational security.
Traceroute 1,
Give two common ways to query or ...,
Nslookup 3
48  cards
4.2 Summarize the importance of policies, processes, and procedures for incident response.
Security incidents 1,
Nist sp800 61 2,
Preparing for an incident 3
22  cards
4.4 Given an incident, apply mitigation techniques or controls to secure an environment.
Endpoint 1,
Approved list 2,
Blocklist 3
16  cards
4.3 Given an incident, utilize appropriate data sources to support an investigation.
What does a vulnerability scanner...,
Siem 2,
How does a siem get its data 3
26  cards
4.5 Explain the key aspects of digital forensics.
Digital forensic 1,
Legal hold 2,
Capture video 3
8  cards
5.1 Compare and contrast various types of controls.
What are the three categories of ...,
What is a managerial control 2,
What is an operational control 3
12  cards
5.2 Explain importance of applicable regulations, standards or frameworks...
Gdpr 1,
Pci dss 2,
Cis 3
20  cards
5.3 Explain the importance of policies to organizational security.
What is an acceptable use policy 1,
What is least privilege 2,
What are some ways to train users 3
30  cards
5.4 Summarize risk management processes and concepts.
Control risk 1,
Residual risk 2,
Inherent risk 3
19  cards
5.5 Explain privacy and sensitive data concepts in relation to security.
Information life cycle 1,
Pia 2,
Proprietary 3
20  cards
Failed on Practice exam
Context aware authentication 1,
What is the mechanism for restori...,
What entity is responsible for va...
23  cards
Failed on 2nd practice exam
A cloud network hub that allows u...,
Which value is the result of a qu...,
Which control types does a system...
24  cards
Failed Exam 3
0  cards
Failed Exam 3
0  cards
Controls
0  cards
Cryptography
0  cards
PKI
0  cards

More about
Security

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study elvis sanchez's Security flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security +
  • 43 decks
  • 2139 flashcards
  • 52 learners
Decks: Fundamentals Of Security, Threat Actors, Physical Security, And more!
Conditional Indicators
  • 3 decks
  • 33 flashcards
  • 176 learners
Decks: Indicator Terms, Conditional Implications, Diagramming Conditionals, And more!
Certified Travel Associate (CTA)
  • 16 decks
  • 1931 flashcards
  • 202 learners
Decks: Time Management, Teamwork, Business Writing Skills, And more!
Make Flashcards