This class was created by Brainscape user James Camp. Visit their profile to learn more about the creator.

Decks in this class (29)

Social Engineering Techniques
Which of the following social eng...,
A user contacted customer support...,
What is a pharming attack
12  cards
Types of Attacks/Malware
_____ is software installed along...,
_____ are malware concealed withi...,
_____ is a fake antivirus where a...
20  cards
Application Attacks
_____ is a malicious script hoste...,
_____ is a malicious script hoste...,
An _____ attack inserts an sql qu...
22  cards
Network Attacks
_____ is a scripting language for...,
_____ refers to using an exploit ...,
_____ is an rfid attack where an ...
16  cards
Threat actors, vectors, and intelligence sources.
_____ uses open source intelligen...
1  cards
security concepts
A _____ is a group of honeypots t...,
A _____ is a server that is inten...,
A _____ is a device used to gener...
10  cards
cloud computing concepts
_____ provides preconfigured envi...,
_____ is managed by a vendor it i...,
_____ provides companies the abil...
9  cards
application development, deployment, and automation concepts.
_____ tracks the versions of soft...,
_____ is a process that follows a...,
_____ is the act of removing or d...
8  cards
authentication and authorization design
_____ is the study and recording ...,
_____ is an in depth biometric so...,
What is hotp
8  cards
cybersecurity resilience
_____ is the use of multiple secu...,
An _____ consists of a collection...,
A _____ can block electromagnetic...
6  cards
implications of embedded and specialized systems.
A _____ is a microchip that conta...,
A _____ system is an industrial c...,
_____is the secure version of rea...
3  cards
cryptographic concepts
_____ is the main component of ec...,
_____ uses ephemeral keys for eac...,
_____ is a framework in which enc...
19  cards
Secure Protocols
_____ is when a port scanner uses...,
The _____ provides an automatic m...,
The _____ is a system for resolvi...
33  cards
host and application security solutions
A _____is also software located o...,
_____ means that all or part of t...,
_____ verifies application code h...
20  cards
secure network designs
A network based firewall analyzes...,
An application firewall analyzes ...,
_____ will ensure a proper failur...
28  cards
wireless security settings
_____ provides authentication aut...,
_____ is a wireless network port ...,
8021x is configured by selecting ...
20  cards
secure mobile solutions
_____ is a term that became popul...,
_____ is the practice of creating...
2  cards
cybersecurity solutions to the cloud
_____ is the on demand service ca...,
A _____ is a means of publishing ...,
A _____ is a part of security as ...
4  cards
authentication and authorization solutions
What type of attacks do kerberos ...,
A _____ is a secure cryptoprocess...,
_____ is specifically designed fo...
8  cards
public key infrastructure
A _____ is a trusted entity that ...,
An _____ can be used to sign and ...,
A _____ is issued to a software p...
24  cards
Security tools
The _____ command views and confi...,
The _____ command uses icmp probe...,
The _____ command performs route ...
20  cards
Incident response
_____ is an incident response lif...,
______ is a stage in the incident...,
_____ is a stage in the incident ...
8  cards
mitigation techniques and controls
_____ correspond to locations in ...,
_____ indicates the physical isol...,
_____ means suspicious traffic th...
4  cards
key aspects of digital forensics
A _____ is a digital file accurat...
1  cards
Various types of controls
A _____ security control provides...,
An _____ security control refers ...,
A _____ security control includes...
8  cards
regulations, standards or frameworks.
The _____ publishes the 20 cis co...,
Department of defense cyber excha...,
_____ by the national institute o...
18  cards
policies to organizational security
The _____ for a software product ...,
The _____ describes when a vendor...,
A _____ is an outdated computing ...
20  cards
risk management processes and concepts
A _____ is a repository for docum...,
A _____ assessment evaluates all ...,
_____ is the likelihood and impac...
10  cards
privacy and sensitive data concepts
_____ involves stealing ideas inv...,
_____ is a database de identifica...,
A _____ process is a practice of ...
15  cards

More about
CompTIA Sec+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study James Camp's CompTIA Sec+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Sec+ Concepts
  • 2 decks
  • 685 flashcards
  • 1 learners
Decks: Concepts, Part 2, And more!
Science Sec 3
  • 22 decks
  • 719 flashcards
  • 24 learners
Decks: Systeme Digestif Et Nutrition, La Technologie, Procreation Assistee, And more!
CompTIA A+
  • 36 decks
  • 1910 flashcards
  • 19 learners
Decks: Mike Meyers Total A Certification 220 10, Jason Dion Comptia A 1001 Exam Prep 1, Jason Dion Comptia A 1001 Exam Prep 2, And more!
CompTIA Project+
  • 18 decks
  • 905 flashcards
  • 74 learners
Decks: 1 Defining Project Management Fundamenta, 2 Initiating The Project, 3 Planning The Project, And more!
Make Flashcards