Security + SY0-601

This class was created by Brainscape user Alket Shabani. Visit their profile to learn more about the creator.

Decks in this class (24)

1.1 Compare and contrast different types of social engineering techniques.
Phishing 1,
Smishing 2,
Spam 3
3  cards
1.2 Given a scenario, analyze potential indicators to determine the type of attack.
0  cards
1.3 Given a scenario, analyze potential indicators associated with application attacks. Given a scenario, analyze potential indicators associated with network attacks.
0  cards
1.4 Given a scenario, analyze potential indicators associated with network attacks.
0  cards
1.5 Explain different threat actors, vectors, and intelligence sources.
0  cards
1.6 Explain the security concerns associated with various types of vulnerabilities.
0  cards
1.7 Summarize the techniques used in security assessments.
0  cards
1.8 Explain the techniques used in penetration testing.
0  cards
3.4 Given a scenario, install and configure wireless security settings.
Wifi protected access 2 wpa2 1,
Wifi protected access 3 wpa3 2,
Counter mode cbc mac 3
19  cards
3.5 Given a scenario, implement secure mobile solutions.
Cellular 1,
Wi fi 2,
Bluetooth 3
32  cards
3.6 Implementing Cloud Security
Casb 1,
Exam tip 2
2  cards
3.7 Given a scenario, implement identity and account management controls.
Identity 1,
Identity provider idp 2,
Attributes 3
12  cards
3.8: Given a scenario, implement authentication and authorization solutions.
Password keys 1,
Password vaults 2,
Tpm 3
25  cards
3.9: Given a scenario, implement public key infrastructure.
Public key infrastructure pki 1,
Registration authorities ras 2,
Certificate authorities cas 3
24  cards
4.1: Given a scenario, use the appropriate tool to assess organizational security.
Network reconnaissance and discov...,
Hping 2,
Exam tip 3
8  cards
4.2: Summarize the importance of policies, processes, and procedures for incident response.
Incident response plans 1,
Incident response process 2,
Preparation 3
15  cards
4.3: Given an incident, utilize appropriate data sources to support an investigation.
Topics 1,
Log files 2,
Exam tip 3
8  cards
Exam Tips
Exam tip 1
1  cards
4.5: Explain the key aspects of digital forensics.
Documentation evidence 1,
Legal hold 2,
Admissibility 3
12  cards
5.1: Compare and contrast various types of controls.
Managerial 1,
Operational 2,
Technical 3
9  cards
5.2: Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture.
General data protection regulatio...,
National territory or state laws 2,
Payment card industry data securi...
12  cards
5.3: Explain the importance of policies to organizational security.
Personnel 1,
Acceptable use policy 2,
Exam tip 3
14  cards
5.4: Summarize risk management processes and concepts.
Risk management strategies 1,
Acceptance 2,
Avoidance 3
40  cards
5.5: Explain privacy and sensitive data concepts in relation to security.
Organizational consequences of pr...,
Exam tip 2,
Notifications of breaches 3
22  cards

More about
Security + SY0-601

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Alket Shabani's Security + SY0-601 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security+ (SY0-601)
  • 35 decks
  • 745 flashcards
  • 2149 learners
Decks: Security Overview, Malware, Malware Infections, And more!
Make Flashcards