This class was created by Brainscape user Deleted Deleted. Visit their profile to learn more about the creator.

Decks in this class (27)

Section 1.1 - Security Controls
What are security controls used f...,
What are technical controls 2,
What are managerial controls 3
12  cards
Section 1.2
What is the cia triad 1,
What does the c i and a stand for 2,
What is confidentiality 3
27  cards
Section 1.3
What is an allow list 1,
What is a deny list 2
2  cards
Section 1.4
What does pki stand for 1,
What s the purpose of the pki 2,
What is symmetric encryption 3
32  cards
Section 2.1
What is a threat actor 1,
What are some attributes of a thr...,
What are the motivations of threa...
9  cards
Section 2.2
What is a threat vector 1,
What are message based threat vec...,
What are image base threat vectors 3
20  cards
Section 2.3
What is memory injection 1,
What is dll injection 2,
What is buffer overflow 3
23  cards
Section 2.4
What is malware and what are some...,
What is ransomware 2,
How to protect against ransomware 3
28  cards
Section 2.5
What are some ways to segment the...,
What are some reasons for segment...,
What is an acl 3
10  cards
Section 3.1
What is saas 1,
What is paas 2,
What is iaas 3
20  cards
Section 3.2
What are security zones 1,
What is the attack surface 1,
Explain ips 2
21  cards
Section 3.3
What is regulated data 1,
What is trade secret data 2,
What is intellectual property data 3
11  cards
Section 3.4
What is server clustering 1,
What is load balancing 2,
What is site resiliency 3
18  cards
Section 4.1
What is an mdm 1,
What is a site survey 2,
What is a heat map 3
19  cards
Section 4.2
What is a central asset tracking ...,
What are the uses of a central as...,
What is the purpose of physical d...
4  cards
Section 4.3
What is the purpose of vulnerabil...,
What is sast 2,
What is dynamic analysis fuzzing 3
12  cards
Section 4.4
What is a siem or sem 1,
What is scap 2,
What are benchmarks 3
7  cards
Section 4.5
Provide the protocol and ports us...,
Provide the protocol and port use...,
Provide the protocol and port use...
13  cards
Section 4.6
What is iam 1,
What is sso 2,
What is ldap 3
15  cards
Section 4.8
What is a tabletop exercise 1,
What are simulation tests 2,
What is threat hunting 3
8  cards
Section 5.1
What is aup 1,
What is the business continuity p...,
What is a disaster recovery plan 3
7  cards
Section 5.2
What is aro 1,
What is av 2,
What is ef 3
10  cards
Section 5.3
What is right to audit clauses 1,
What is a sla 2,
What is mou 3
8  cards
Section 5.5
What is the reconnaissance proces...,
What is passive reconnaissance 2,
What is active reconnaissance 3
3  cards
Section 5.6
What is anomalous behavior recogn...
1  cards
MUST STUDY
Explain moa 1,
Explain sla 2,
Explain scada 3
58  cards
more study
Explain bia 1,
Explain pki 2,
Explain sed 3
13  cards

More about
Security+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Deleted Deleted's Security+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security +
  • 43 decks
  • 2139 flashcards
  • 54 learners
Decks: Fundamentals Of Security, Threat Actors, Physical Security, And more!
Security +
  • 26 decks
  • 1501 flashcards
  • 241 learners
Decks: Deck A, Deck B, Deck C, And more!
Make Flashcards