This class was created by Brainscape user Shawn Mosby. Visit their profile to learn more about the creator.

Decks in this class (27)

Section 2.2 Virtualization and Cloud Computing Concepts
What do you call a distributed we...,
Cloud computing uses _________ to...,
Cloud computing allows software t...
43  cards
Section 2.3 Secure Application development, deployment, and automation concepts
What do you call the ability to a...,
What do you call automatically sc...,
What sdlc method goes through eac...
66  cards
Section 2.4 Authentication and Authorization Design concepts
What authentication concept is th...,
What authentication concept is th...,
What authentication concept is th...
46  cards
Section 2.5 Cybersecurity resilience implementation
What term means that an organizat...,
The ability to provide uninterrup...,
What concept allows resources and...
49  cards
Section 2.6 Security Implications of Embedded and Specialized systems
What do you call computing system...,
What concept involves having a si...,
What do you call os installed on ...
30  cards
Section 2.7 Physical Security Controls
What is put into place to prevent...,
Your first line of defense is the...,
Lighting on the perimeter should ...
29  cards
Section 2.8 Basics of Cryptographic concepts
What do you call the conversion o...,
The central function of cryptogra...,
Encryption ensures _______ by kee...
86  cards
Section 3.1 Secure Protocols
What is layer 7 of the osi model,
What is layer 6 of the osi model,
What is layer 5 of the osi model
91  cards
Section 3.2 Host and Application Security Solutions
Where should endpoint detection b...,
What monitors network activity fo...,
What monitors network activity an...
111  cards
Section 3.3 Implementing secure network designs
What provide a first line of defe...,
What is a network device that hel...,
If one router receives too many r...
78  cards
Section 5.4 Risk Management Processes & Concepts
What is the act of identifying as...,
What kind of risk comes from elem...,
What kind of risk is usually the ...
72  cards
Section 5.5 Privacy and Sensitive data concepts in relation to security
What concept relates to the contr...,
What concept relates to how perso...,
What report shows the cost of dat...
26  cards
Mom's Study Guide
What do you call asymmetric encry...,
What is the ultimate authority of...,
What kind of certificate authorit...
815  cards
Protocols
What protocol uses port 49,
What protocol uses port 53,
What protocol uses ports 67 68
14  cards
Section 4.1 Organizational Security
What command tool shows the route...,
What is a diagnostic tool for ver...,
What is the equivalent of nslooku...
44  cards
Section 3.4 Install and configure wireless security settings
Without proper ___________ any pe...,
Using you wireless device on an o...,
What concept heavily involves the...
18  cards
Section 3.5 Secure mobile solutions
What is the standard used primari...,
Because nfc used rfid technology ...,
What kind of attack relays modifi...
16  cards
Section 1.2 Potential indicators to determine the type of attack
What type of viruses infect the b...,
What is the best way to remove a ...,
What is the most common way a boo...
26  cards
Section 1.3 Analyze potential indicators associated with application attacks
In what kind of attack does the a...,
Buffer overflow attacks typically...,
Buffer overflow attacks are cause...
23  cards
4.2 Importance of policies, processes, and procedures for incident response
What do you call a set of intende...,
What do you call a series of rela...,
What do you call a prescribed way...
41  cards
Section 4.3 Appropriate data sources to support an investigation
What can identify an report vario...,
Dashboards are very useful to the...,
What kind of log file can identif...
27  cards
Section 4.4 Applying mitigation techniques or controls
Where are the approved applicatio...,
What is the list of applications ...,
What is it called when a device h...
25  cards
Section 4.5 Key aspects of digital forensics
What protects any documents that ...,
What tracks the movement of evide...
2  cards
Section 5.1 Compare and Contrast Controls
What do you call security measure...,
Safeguards are ________ while cou...,
What is the functional order of s...
12  cards
Section 5.2 Regulations, Standards, and Frameworks
What do you call any information ...,
What do you call any information ...,
What do you call health informati...
23  cards
Section 5.3 Importance of Policies to Organizational security
What is a basic security principl...,
What is the concept that employee...,
What policy increases the physica...
19  cards
Section 2.1 Security Concepts in an Enterprise Environment
What ensures that systems are con...,
What helps reduce outages or weak...,
What uses a labeling or numbering...
33  cards

More about
Comptia SEC+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Shawn Mosby's Comptia SEC+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Sec+ SY0-701
  • 22 decks
  • 953 flashcards
  • 458 learners
Decks: Comptia Sec Sy0 701 Acronyms V1, Comptia Sec Sy0 701 Acronyms V2, Comptia Sec Sy0 701 Acronyms V3, And more!
Sec+
  • 16 decks
  • 936 flashcards
  • 340 learners
Decks: Ch 1 5, Sec Vista, Ch 6 7 8, And more!
CompTIA A+
  • 28 decks
  • 3865 flashcards
  • 641 learners
Decks: Chapter 1 Mobile Devices Mc, Chapter 1 Mobile Devices, Chapter 1 Mobile Devices Key Terms, And more!
Comp TIA Chapter Reviews
  • 28 decks
  • 758 flashcards
  • 21 learners
Decks: Chapter 2 Review Operational Procedures, Chapter 3 Review The Visible Computer, Chapter 4 Review Microprocessors, And more!
Make Flashcards