Brainscape
Find Flashcards
Make Flashcards
Why It Works
More
Educators
Businesses
Tutors & resellers
Content partnerships
Academy
About
Educators
Teachers & professors
Content partnerships
Tutors & resellers
Businesses
Employee training
Content partnerships
Tutors & resellers
Academy
About
Log In
Get Started
Brainscape's Knowledge Genome
TM
Browse over 1 million classes created by top students, professors, publishers, and experts.
Entrance Exams
Professional Certifications
Foreign Languages
Medical & Nursing
Science
English
Humanities & Social Studies
Mathematics
Law
Vocations
Health & Fitness
Business & Finance
Technology & Engineering
Food & Beverage
Fine Arts
Random Knowledge
See full index
Security Comp TIA 701
> Malicious Updates 2.3 > Flashcards
Malicious Updates 2.3 Flashcards
Study These Flashcards
1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
Security Comp TIA 701
(75 decks)
Security Controls 1.1
THE CIA/AIC Triad 1.2
Non-Repudiation 1.2
Authentication, Authorization, & Account 1.2
Gap Analysis 1.2
Zero Trust 1.2
Physical Security 1.2
Deception and Disruption 1.2
Change Management 1.3
Technical Change Management 1.3
Public Key Infrastructure 1.4
Encrypting Data 1.4
Key Exchange 1.4
Encyrption Technologies 1.4
Obfuscation 1.4
Hashing and Digital Signatures 1.4
Blockchain Technology 1.4
Certificates 1.4
Threat Actors 2.1
Common Threat Vector 2.2
Phishing 2.2
Impersonation 2.2
Watering Hole Attacks 2.2
Misinformation and Disinformation 2.2
Memory Injections 2.3
Buffer Overflows 2.3
Race Condition 2.3
Malicious Updates 2.3
Operating System Vulnerabilities 2.3
SQL Injection 2.3
Cross Site Scripting 2.3
Hardware Vulnerabilities 2.3
Virtualization Security 2.3
Cloud-Specific Vulnerabilities 2.3
Supply Chain Attack 2.3
Misconfiguration Vulnerabilities 2.3
Mobile Device Vulnerabilities 2.3
Zero-Day Vulnerabilities 2.3
An Overview of Malware 2.4
Virus and Worms 2.4
Spyware and Bloatware 2.4
Other Malware Types 2.4
Physical Attacks 2.4
Denial of Service 2.4
DNS Poisoning 2.4
Wireless Attacks 2.4
On-path Attacks 2.4
Replay Attacks 2.4
Malicious Code 2.4
Application Attack 2.4
Cryptographic Attacks 2.4
Password Attacks 2.4
Indicators of Compromise 2.4
Segmentation and Access Control 2.5
Mitigation Techniques 2.5
Hardening Technique 2.5
Cloud Infrastructure 3.1
Data Types and Classifications 3.3
Resiliency 3.4
Recovery Testing 3.4
Hardening Targets 4.1
Vulnerability Remediation 4.3
Firewalls 4.5
Web Filtering 4.5
Access Control 4.6
Multi-factor Authentication 4.6
Incident Planning 4.8
Log Data 4.9
Security Policies 5.1
Data and Responsibilities 5.1
Risk Analysis 5.2
Business Analysis Impact 5.2
Agreement Types 5.3
Compliance 5.4
Penetration Testing 5.5