This class was created by Brainscape user Zach Harvey. Visit their profile to learn more about the creator.

Decks in this class (37)

Ports and protocols
Which service typically runs on p...,
Which service typically runs on p...,
Which service typically runs on p...
23  cards
Social Engineering
Phishing,
What is typosquatting,
What is pharming
13  cards
Attack types
Which type of malware can reprodu...,
Which type of malware reproduces ...,
Which type of virus is part of th...
21  cards
Application attacks
This type of attack takes advanta...,
This type of attack takes advanta...,
Which type of attack takes advant...
11  cards
Network Attacks
What is 8021x,
When you authenticate to a networ...,
Which type of network attack whil...
32  cards
Threat actors and Vectors
Name two wireless encryption prot...,
What does cve stand for,
In threat intelligence what would...
9  cards
Vulnerabilities
Which type of vulnerability which...,
Which type of vulnerability would...
2  cards
Security assessments
What is a syslog,
What is a syslog,
What is ueba in regards to analyz...
5  cards
Pentesting
In the realm of security operatio...
1  cards
Enterprise security
What is an ip schema,
What is a baseline configuration,
Which security principle would co...
27  cards
Virtualization and cloud computing
What is iaas,
What is saas,
What is paas
23  cards
Secure application development
What is sandboxing in regards to ...,
What is the difference between a ...,
When does qa happen in development
16  cards
Authentication and Authorization
What is kerberos,
What is ldap,
What is federation
12  cards
Resilience
In the realm of it networking sec...,
What is geographic dispersal,
What is multipath i o
16  cards
Embedded systems
What are embedded systems,
What is a soc in regards to embed...,
What is an fpga
8  cards
Physical security controls
What is industrial camouflage,
What are cable locks,
What is a usb data blocker
11  cards
Cryptography
What is cryptanalysis,
A key is added to what when tryin...,
What is key stretching or key str...
13  cards
Secure protocols
What is srtp and rtp,
What is ntpsec,
What is s mime
14  cards
Host and app security
What is the difference between an...,
What is a tpm,
What is an hsm
18  cards
Secure network designs
What is another function of a loa...,
In load balancing what is round r...,
What is active active load balancing
40  cards
Secure network designs part 2
What is a proxy server,
What is the difference between an...,
Which osi layer do proxies usuall...
9  cards
Wireless security
What is a mic,
What is a wap,
Which security services and which...
18  cards
Mobile Security
What is the difference between a ...,
What is the difference between md...,
What is a remote wipe
17  cards
Cloud security
For cloud based applications what...,
What is iam identity and access m...,
Which type of encryption would yo...
9  cards
Identity and account management
What is an idp,
When it comes to identity and aut...,
What is a shared account
6  cards
Authentication and Authorization Services
Which factor of authentication wo...,
Are credentials encrypted inside ...,
What is a tpm
25  cards
Public Key Infrastructure
What is pki,
What is the key management lifecy...,
What is a digital certificate
33  cards
Security Tools
What does the traceroute command do,
What is ttl in relation to tracer...,
What do the nslookup and dig comm...
28  cards
Incident Response
What is nist sp800 61 used for,
What is an incident precursor,
What is an incident indicator
17  cards
Investigations
How does a vulnerability scanner ...,
Whats a dump file,
What is syslog
10  cards
Securing an Environment
When we refer to an endpoint what...,
Where is the ability to run or no...,
What is a content filter url filter
7  cards
Digital Forensics
What is a legal hold,
What is chain of custody,
In terms of data on a computer ca...
15  cards
Security Controls
What are managerial controls,
What are operational controls,
What are technical controls
9  cards
Regulations, Standards, and Frameworks
What is compliance in cybersecurity,
What is gdpr,
What is pci dss
12  cards
Organizational Security Policies
What is an acceptable use policy,
What is a job rotation,
What are mandatory vacations
15  cards
Risk Management
What is risk acceptance,
What is risk avoidance,
What is risk transference
19  cards
Data Privacy
What is the information life cycle,
What is a pia,
What is the difference between pr...
13  cards

More about
Sec+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Zach Harvey's Sec+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Science Sec 3
  • 22 decks
  • 719 flashcards
  • 24 learners
Decks: Systeme Digestif Et Nutrition, La Technologie, Procreation Assistee, And more!
Science Sec 4
  • 14 decks
  • 419 flashcards
  • 40 learners
Decks: Quiz 1, Quiz 2, Quiz 3, And more!
CompTIA Sec+ SY0-701
  • 22 decks
  • 953 flashcards
  • 254 learners
Decks: Comptia Sec Sy0 701 Acronyms V1, Comptia Sec Sy0 701 Acronyms V2, Comptia Sec Sy0 701 Acronyms V3, And more!
Human Physiology - PNUR1143 -22S - Sec 1
  • 26 decks
  • 3535 flashcards
  • 30 learners
Decks: Cells, Tissues And Membranes, Integumentary System, And more!
Make Flashcards