This class was created by Brainscape user Brian Gorenca. Visit their profile to learn more about the creator.

Decks in this class (27)

Section 1.1 - Security Controls
What are security controls used for,
What are technical controls,
What are managerial controls
12  cards
Section 1.2
What is the cia triad,
What does the c i and a stand for,
Confidentiality
27  cards
Section 1.3
What is an allow list,
What is a deny list
2  cards
Section 1.4
What does pki stand for,
What s the purpose of the pki,
What is symmetric encryption
32  cards
Section 2.1
What is a threat actor,
What are some attributes of a thr...,
What are the motivations of threa...
9  cards
Section 2.2
What is a threat vector,
What are message based threat vec...,
What are image base threat vector
20  cards
Section 2.3
What is memory injection,
What is dll injection,
What is buffer overflow
23  cards
Section 2.4
What is malware and what are some...,
What is ransomware,
How to protect against ransomware
28  cards
Section 2.5
What are some ways to segment the...,
What are some reasons for segment...,
What is an acl
10  cards
Section 3.1
What is saas,
What is paas,
What is iaas
20  cards
Section 3.2
What are security zones,
What is the attack surface,
Explain ips
21  cards
Section 3.3
What is regulated data,
What is trade secret data,
What is intellectual property data
11  cards
Section 3.4
What is server clustering,
What is load balancing,
What is site resiliency
18  cards
Section 4.1
What is an mdm,
What is a site survey,
What is a heat map
19  cards
Section 4.2
What is a central asset tracking ...,
What are the uses of a central as...,
What is the purpose of physical d...
4  cards
Section 4.3
What is the purpose of vulnerabil...,
What is sast,
What is dynamic analysis fuzzing
12  cards
Section 4.4
What is a siem or sem,
What is scap,
What are benchmarks
7  cards
Section 4.5
Provide the protocol and ports us...,
Provide the protocol and port use...,
Provide the protocol and port use...
13  cards
Section 4.6
What is iam,
What is sso,
What is ldap
15  cards
Section 4.8
What is a tabletop exercise,
What are simulation tests,
What is threat hunting
8  cards
Section 5.1
What is aup,
What is the business continuity plan,
What is a disaster recovery plan
7  cards
Section 5.2
What is aro,
What is av,
What is ef
10  cards
Section 5.3
What is right to audit clauses,
What is a sla,
What is mou
8  cards
Section 5.5
What is the reconnaissance proces...,
What is passive reconnaissance,
What is active reconnaissance
3  cards
Section 5.6
What is anomalous behavior recogn...
1  cards
MUST STUDY
Explain moa,
Explain sla,
Explain scada
58  cards
more study
Explain bia,
Explain pki,
Explain sed
6  cards

More about
Security+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Brian Gorenca's Security+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Security+ Practice exams
  • 38 decks
  • 2776 flashcards
  • 170 learners
Decks: Professor Messer Practice Questions, Comptia Practice Questions, Comptia Review Questions, And more!
Security +
  • 26 decks
  • 1501 flashcards
  • 228 learners
Decks: Deck A, Deck B, Deck C, And more!
Make Flashcards