Security + 501 - FHSU - Feb 3 - 13

This class was created by Brainscape user Casey Tozier. Visit their profile to learn more about the creator.

Decks in this class (39)

Domain 1.1 - Given a scenario, analyze indicators of compromise and determine the type of malware.
Describe an armored virus,
Describe a companion virus,
What does a macro virus affect
23  cards
Domain 1.2 - Compare and contrast types of attacks.
____________ is the process by wh...,
What is phishing,
How is spear phishing different f...
64  cards
Domain 1.3 - Explain threat actor types and attributes.
Script kiddies,
Hacktivist,
Suicide hacker
9  cards
Domain 1.4 - Explain penetration testing concepts.
Pivot,
Passive reconnaissance,
This is the point when a particul...
19  cards
Domain 1.5 - Explain vulnerability scanning concepts.
Intrusive testing,
Non intrusive tests,
What is a vulnerability scan
10  cards
Domain 1.6 - Explain the impact associated with types of vulnerabilities.
Embedded systems,
Improper input handling,
Improper error handling
15  cards
Domain 2.1 Install and configure network components, both hardware- and software based, to support organizational security.
Number 1 vpn tunnel in the world,
What is a piece of hardware desig...,
What does a packet filtering fire...
73  cards
Domain 2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization.
Wireshark,
Pwdump,
Microsoft baseline security analy...
38  cards
Domain 2.3 Given a scenario, troubleshoot common security issues.
Syslog server,
Where would you check for a revok...,
Test question blah blah you need ...
8  cards
Domain 2.4 Given a scenario, analyze and interpret output from security technologies.
Hids hips,
File integrity verifier,
Application whitelist
12  cards
Domain 2.5 Given a scenario, deploy mobile devices securely.
Mdm,
Remote wipe,
Geofencing
33  cards
Domain 2.6 Given a scenario, implement secure protocols.
Dnssec,
Ssh,
S mime
17  cards
Ports
Ports 20 21,
Ports 22 connection protocol,
Port 23
31  cards
3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides
Regulatory,
Inter national,
Industry specific frameworks
12  cards
3.2 Given a scenario, implement secure network architecture concepts.
Dmz,
Extranet,
Bastion host
27  cards
3.3 Given a scenario, implement secure systems design.
Full disk encryption,
Tpm,
On the exam if you fully encrypte...
13  cards
3.4 Explain the importance of secure staging deployment concepts
Sandbox,
Fuzzing,
Staging
5  cards
3.5 Explain the security implications of embedded systems.
Scada,
Wearables,
Iot
9  cards
3.6 Summarize secure application development and deployment concepts.
Change management,
Advanced persistent threats apts,
Agile development
14  cards
3.7 Summarize cloud and virtualization concepts
Cloud bursting,
Hypervisor,
Hypervisor type 1
17  cards
3.8 Explain how resiliency and automation strategies reduce risk.
Templates,
Elasticity,
Scalability
13  cards
3.9 Explain the importance of physical security controls.
Faraday cage,
Mantrap,
Bollards
9  cards
4.1 Compare and contrast identity and access management concepts.
What is the concept of uniquely n...,
Identification,
Authentication
19  cards
4.2 Given a scenario, install and configure identity and access services.
Mutual authentication,
Ldap,
Kerberos
16  cards
4.3 Given a scenario, implement identity and access management controls.
Mandatory access control,
Discretionary access control,
Role based access control
18  cards
4.4 Given a scenario, differentiate common account management practices.
Guest account,
Service account,
Least privilege
24  cards
4.5 Given a scenario, deploy mobile devices securely.
0  cards
5.1 Explain the importance of policies, plans and procedures related to organizational security.
Business continuity plan bcp,
Business partners agreement bpa,
Service level agreement sla
17  cards
5.2 Summarize business impact analysis concepts.
High availability,
Business impact analysis,
Recovery time objective rto
11  cards
5.3 Explain risk management processes and concepts.
Threat,
Vulnerability,
Exploit
22  cards
5.4 Given a scenario, follow incident response procedures.
Event,
Incident,
Incident response plan irp
14  cards
5.5 Summarize basic concepts of forensics.
What is the order of volatility,
Chain of custody,
Legal hold
14  cards
5.6 Explain disaster recovery and continuity of operation concepts.
Disaster recovery plan drp,
Hot site,
Warm site
10  cards
5.7 Compare and contrast various types of controls.
Technical control,
Administrative control,
Deterrent control
5  cards
5.8 Given a scenario, carry out data security and privacy practices.
Clearing,
Purging,
Destruction
9  cards
6.1 Compare and contrast basic concepts of cryptography.
Encryption gives you ______,
Digital signatures give you _____...,
Hashing gives you _____
46  cards
6.2 Explain cryptography algorithms and their basic characteristics.
1 symmetric encryption in the world,
Des,
3des
30  cards
6.3 Given a scenario, install and configure wireless security settings
Wpa,
What is the only thing tkip is us...,
Wpa2
20  cards
6.4 Given a scenario, implement public key infrastructure.
Certificate authority ca,
Registration authority,
Certificate revocation list crl
27  cards

More about
Security + 501 - FHSU - Feb 3 - 13

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Casey Tozier's Security + 501 - FHSU - Feb 3 - 13 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security+ SY0-501 by Glen E. ...
  • 48 decks
  • 593 flashcards
  • 30 learners
Decks: Ch19 Understanding Monitoring And Auditi, Ch18 1802 Performing A Security Assessme, Ch18 1801 Understanding Types Of Assessm, And more!
Simmons NURP 501 Exam 3
  • 27 decks
  • 523 flashcards
  • 435 learners
Decks: Practice Questions, 10 Genetic Vocabulary, 10 Misc Genetics, And more!
13 old
  • 21 decks
  • 858 flashcards
  • 29 learners
Decks: Particle Physics, Quantum Mechanics, Mechanics And Materials, And more!
Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
Make Flashcards