Brainscape
Find Flashcards
Discover millions of Flashcards
Browse Brainscape-Certified Flashcards
Learn faster with our catalog of expert certified, pre-made flashcards.
Browse All Flashcards
Browse our full catalog of user-generated and Brainscape-Certified flashcards.
Explore the
Knowledge Genome
of subjects:
Entrance Exams
Professional Certifications
Foreign Languages
Medical & Nursing
Science
English
Humanities & Social Studies
Mathematics
Law
Vocations
Health & Fitness
Business & Finance
Technology & Engineering
Food & Beverage
Fine Arts
Random Knowledge
Make Flashcards
How It Works
For Instructors
Teachers & professors
Employee training
Sell my flashcards
Academy
Study Tips
Teaching Tips
Employee Training Tips
Language Learning Tips
Test Prep Tips
More
Pricing
About
Log in
Log in
Get Started
CompTIA Security+
> 15B: Apply Cloud Security Solutions > Flashcards
15B: Apply Cloud Security Solutions Flashcards
(0 cards)
Start Studying
CompTIA Security+
(61 decks)
1A: Compare and Contrast Information Security Roles
1B: Compare and Contrast Security Control and Framework Types
2A: Explain Threat Actor Types and Attack Vectors
2B: Explain Threat Intelligence Sources
3A: Assess Organizational Security with Network Reconnaissance Tools
3B: Explain Security Concerns with General Vulnerability Types
3C: Summarize Vulnerability Scanning Techniques
3D: Explain Penetration Testing Concepts
4A: Compare and Contrast Social Engineering Techniques
4B: Analyze Indicators of Malware-Based Attacks
5A: Compare and Contrast Cryptographic Ciphers
5B: Summarize Cryptographic Modes of Operation
5C: Summarize Cryptographic Use Cases and Weaknesses
5D: Summarize Other Cryptographic Technologies
6A: Implement Certificates and Certificate Authorities
6B: Implement PKI Management
7A: Summarize Authentication Design Concepts
7B: Implement Knowledge-Based Authentication
7C: Implement Authentication Technologies
7D: Summarize Biometrics Authentication Concepts
8A: Implement Identity and Account Types
8B: Implement Account Policies
8C: Implement Authorization Solutions
8D: Explain the Importance of Personnel Policies
9A: Implement Secure Network Designs
9B: Implement Secure Switching and Routing
9C: Implement Secure Wireless Infrastructure
9D: Implement Load Balancers
10A: Implement Firewalls and Proxy Servers
10B: Implement Network Security Monitoring
10C: Summarize the Use of SIEM
11A: Implement Secure Network Operations Protocols
11B: Implement Secure Application Protocols
11C: Implement Secure Remote Access Protocols
12A: Implement Secure Firmware
12B: Implement Endpoint Security
12C: Explain Embedded System Security Implications
13A: Implement Mobile Device Management
13B: Implement Secure Mobile Device Connections
14A: Analyze Indicators of Application Attacks
14B: Analyze Indicators of Web Application Attacks
14C: Summarize Secure Coding Practices
14D: Implement Secure Script Environments
14E: Summarize Deployment and Automation Concepts
15A: Summarize Secure Cloud and Virtualization Services
15B: Apply Cloud Security Solutions
15C: Summarize Infrastructure as Code Concepts
16A: Explain Privacy and Data Sensitivity Concepts
16B: Explain Privacy and Data Protection Controls
17A: Summarize Incident Response Procedures
17B: Utilize Appropriate Data Sources for Incident Response
17C: Apply Mitigation Controls
18A: Explain Key Aspects of Digital Forensics Documentation
18B: Explain Key Aspects of Digital Forensics Evidence Acquisition
19A: Explain Risk Management Processes and Concepts
19B: Explain Business Impact Analysis Concepts
20A: Implement Redundancy Strategies
20B: Implement Backup Strategies
20C: Implement Cybersecurity Resiliency Strategies
21A: Explain the Importance of Physical Site Security Controls
21B: Explain the Importance of Physical Host Security Controls