Brainscape
Find Flashcards
Make Flashcards
Why It Works
More
Educators
Businesses
Tutors & resellers
Content partnerships
Academy
About
Educators
Teachers & professors
Content partnerships
Tutors & resellers
Businesses
Employee training
Content partnerships
Tutors & resellers
Academy
About
Log In
Get Started
Brainscape's Knowledge Genome
TM
Browse over 1 million classes created by top students, professors, publishers, and experts.
Entrance Exams
Professional Certifications
Foreign Languages
Medical & Nursing
Science
English
Humanities & Social Studies
Mathematics
Law
Vocations
Health & Fitness
Business & Finance
Technology & Engineering
Food & Beverage
Fine Arts
Random Knowledge
See full index
INFOSYS 727
> Module 6 - Disaster Recovery > Flashcards
Module 6 - Disaster Recovery Flashcards
Study These Flashcards
1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
INFOSYS 727
(54 decks)
Risk Management Continue
Informationn Security And Risk Management
Security Management
Security Roles and Responsibilities
Data Classification and Protection
Personnel Security
Cryptography
Governance and compliance
Governance
Ethics
Security Management Framework
Application of Cryptography
Management of Cryptography
Encryption Alternatives
Network Security Testing
Security Automation
Chapter 10 - Wired Telecom Technologies
Chapter 10 - Network Technologies
Chaper 10 - Network Topologies
Chapter 10 - Ethernet Devices
Chapter 10 - Wireless Network Technologies
Chapter 10 - Network Protocols
Chapter 10 - Network-Based Threats, Attacks and Vulnerabilities
Network Security Testing Tools
Penetration Testing
Information Sources
Threat Intelligence services
Network and Server Vulnerability
Common Vulnerability Scoring System
Secure Device Management
Enpoint Vulnerability Quiz
Module 5 - Risk Management
Module 5 - Risk Assessment
Module 5 - Security Control
Chapter 2 - Access Control
Chapter 2 - Access Control Technologies and Methods
Chapter 2 - Access Control Attacks
Chapter 2 - Access Control Processes
Chapter 2 - Access Control Concepts
Chapter 2 - Testing Access Controls
Module 6 - Digital Forensics
Module 6 - The Cyber Kill Chain & Diamond Model
Module 6 - Incident Response
Module 6 - Disaster Recovery
Chapter 3 - Operating Systems
Chapter 3 - Software Models and Technologies
Chapter 3 - Threats in Software Environments
Chapter 3 - Threats in Software Continued
Chapter 3 - Security in the Software Development Life Cycle
Chapter 3 - Application Environment and Security Controls
Chapter 4 - Business Continuity and Disaster Recovery Planning
Chapter 9 - Security Concepts
Chapter 9 - Information Systems Evaluation Models
Chapter 9 - Certification and Accreditation