Security + 501 - FHSU - Feb 3 - 13

This class was created by Brainscape user Casey Tozier. Visit their profile to learn more about the creator.

Decks in this class (39)

Domain 1.1 - Given a scenario, analyze indicators of compromise and determine the type of malware.
Describe an armored virus 1,
Describe a companion virus 2,
What does a macro virus affect 3
23  cards
Domain 1.2 - Compare and contrast types of attacks.
____________ is the process by wh...,
What is phishing 2,
How is spear phishing different f...
64  cards
Domain 1.3 - Explain threat actor types and attributes.
Script kiddies 1,
Hacktivist 2,
Suicide hacker 3
9  cards
Domain 1.4 - Explain penetration testing concepts.
Pivot 1,
Passive reconnaissance 2,
This is the point when a particul...
19  cards
Domain 1.5 - Explain vulnerability scanning concepts.
Intrusive testing 1,
Non intrusive tests 2,
What is a vulnerability scan 3
10  cards
Domain 1.6 - Explain the impact associated with types of vulnerabilities.
Embedded systems 1,
Improper input handling 2,
Improper error handling 3
15  cards
Domain 2.1 Install and configure network components, both hardware- and software based, to support organizational security.
Number 1 vpn tunnel in the world 1,
What is a piece of hardware desig...,
What does a packet filtering fire...
73  cards
Domain 2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization.
Wireshark 1,
Pwdump 2,
Microsoft baseline security analy...
38  cards
Domain 2.3 Given a scenario, troubleshoot common security issues.
Syslog server 1,
Where would you check for a revok...,
Test question blah blah you need ...
8  cards
Domain 2.4 Given a scenario, analyze and interpret output from security technologies.
Hids hips 1,
File integrity verifier 2,
Application whitelist 3
12  cards
Domain 2.5 Given a scenario, deploy mobile devices securely.
Mdm 1,
Remote wipe 2,
Geofencing 3
33  cards
Domain 2.6 Given a scenario, implement secure protocols.
Dnssec 1,
Ssh 2,
S mime 3
17  cards
Ports
Ports 20 21 1,
Ports 22 connection protocol 2,
Port 23 3
31  cards
3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides
Regulatory 1,
Inter national 2,
Industry specific frameworks 3
12  cards
3.2 Given a scenario, implement secure network architecture concepts.
Dmz 1,
Extranet 2,
Bastion host 3
27  cards
3.3 Given a scenario, implement secure systems design.
Full disk encryption 1,
Tpm 2,
On the exam if you fully encrypte...
13  cards
3.4 Explain the importance of secure staging deployment concepts
Sandbox 1,
Fuzzing 2,
Staging 3
5  cards
3.5 Explain the security implications of embedded systems.
Scada 1,
Wearables 2,
Iot 3
9  cards
3.6 Summarize secure application development and deployment concepts.
Change management 1,
Advanced persistent threats apts 2,
Agile development 3
14  cards
3.7 Summarize cloud and virtualization concepts
Cloud bursting 1,
Hypervisor 2,
Hypervisor type 1 3
17  cards
3.8 Explain how resiliency and automation strategies reduce risk.
Templates 1,
Elasticity 2,
Scalability 3
13  cards
3.9 Explain the importance of physical security controls.
Faraday cage 1,
Mantrap 2,
Bollards 3
9  cards
4.1 Compare and contrast identity and access management concepts.
What is the concept of uniquely n...,
Identification 2,
Authentication 3
19  cards
4.2 Given a scenario, install and configure identity and access services.
Mutual authentication 1,
Ldap 2,
Kerberos 3
16  cards
4.3 Given a scenario, implement identity and access management controls.
Mandatory access control 1,
Discretionary access control 2,
Role based access control 3
18  cards
4.4 Given a scenario, differentiate common account management practices.
Guest account 1,
Service account 2,
Least privilege 3
24  cards
4.5 Given a scenario, deploy mobile devices securely.
0  cards
5.1 Explain the importance of policies, plans and procedures related to organizational security.
Business continuity plan bcp 1,
Business partners agreement bpa 2,
Service level agreement sla 3
17  cards
5.2 Summarize business impact analysis concepts.
High availability 1,
Business impact analysis 2,
Recovery time objective rto 3
11  cards
5.3 Explain risk management processes and concepts.
Threat 1,
Vulnerability 2,
Exploit 3
22  cards
5.4 Given a scenario, follow incident response procedures.
Event 1,
Incident 2,
Incident response plan irp 3
14  cards
5.5 Summarize basic concepts of forensics.
What is the order of volatility 1,
Chain of custody 2,
Legal hold 3
14  cards
5.6 Explain disaster recovery and continuity of operation concepts.
Disaster recovery plan drp 1,
Hot site 2,
Warm site 3
10  cards
5.7 Compare and contrast various types of controls.
Technical control 1,
Administrative control 2,
Deterrent control 3
5  cards
5.8 Given a scenario, carry out data security and privacy practices.
Clearing 1,
Purging 2,
Destruction 3
9  cards
6.1 Compare and contrast basic concepts of cryptography.
Encryption gives you ______ 1,
Digital signatures give you _____...,
Hashing gives you _____ 3
46  cards
6.2 Explain cryptography algorithms and their basic characteristics.
1 symmetric encryption in the wor...,
Des 2,
3des 3
30  cards
6.3 Given a scenario, install and configure wireless security settings
Wpa 1,
What is the only thing tkip is us...,
Wpa2 3
20  cards
6.4 Given a scenario, implement public key infrastructure.
Certificate authority ca 1,
Registration authority 2,
Certificate revocation list crl 3
27  cards

More about
Security + 501 - FHSU - Feb 3 - 13

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Casey Tozier's Security + 501 - FHSU - Feb 3 - 13 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security+ Practice Tests: Exa...
  • 30 decks
  • 924 flashcards
  • 376 learners
Decks: Threats Attacks And Vulnerabilities 1, Threats Attacks And Vulnerabilities 2, Threats Attacks And Vulnerabilities 3, And more!
Physiology 501
  • 37 decks
  • 569 flashcards
  • 2 learners
Decks: Sexual Differentiation Disorders, Hypothalamic Pituitary Gonadal Axis Ii, Hypothalamic Pituitary Gonadal Axis, And more!
Year 13 Biology
  • 69 decks
  • 2445 flashcards
  • 15 learners
Decks: 11 Introduction To Biological Molecules, Transport Across Cell Membranes, Homeostasis Blood Glucose, And more!
CompTIA Security +
  • 43 decks
  • 2139 flashcards
  • 53 learners
Decks: Fundamentals Of Security, Threat Actors, Physical Security, And more!
Make Flashcards