This class was created by Brainscape user Jason Owens. Visit their profile to learn more about the creator.

Decks in this class (35)

1.1 Social Engineering
Define phishing 1,
Smishing 2,
Vishing 3
30  cards
1.2 Attack Types
Define ransomware 1,
Define trojan 2,
Define worm 3
39  cards
1.3 Application Attacks
Define privilege escalation 1,
Examples of privilege escalation ...,
Preventing privilege escalation a...
42  cards
1.4 Network Attacks
Define evil twin attack 2 methods 1,
How to protect against evil twin ...,
Define rouge access point attack 3
28  cards
1.5 Threat Actors, Vectors & Intelligence Sources
Define advanced persistent threat...,
Example of an apt 2,
Define insider threat actors 3
39  cards
1.6 Vulnerabilities & Security Concerns
Security concerns of a zero day v...,
Security concern of open permissi...,
Security concern of unsecure root...
16  cards
1.7 Security Assessment Techniques
Define threat hunting intelligenc...,
Define threat hunting advisories ...,
Define threat hunting maneuver 3
21  cards
1.8 Penetration Testing
Penetration testing 3 levels of t...,
Define penetration testing rules ...,
Define penetration testing latera...
17  cards
2.1 Enterprise Security Concepts
What is the importance of configu...,
What is the importance of network...,
What is the importance of baselin...
25  cards
2.2 Virtualization & Cloud Computing
Define iaas 2 1,
Define saas 3 2,
Define paas 3 3
26  cards
2.3 Application Development, Deployment & Automation
What is the staging environment 1,
Define provisioning 2,
Define de provisioning 3
20  cards
2.4 Authentication & Authorization
Define federation 1,
Define attestation 2,
Define totp for authentication 3
31  cards
2.5 Cybersecurity Resilience
Define 3 common raid levels 1,
Define multipath relative to disk...,
Define geographic dispersal 3
40  cards
2.6 Embedded & Specialized Systems
What are security concerns of ras...,
Define fpga 2,
Scada ics security concerns 3
12  cards
2.7 Physical Security Controls
0  cards
2.8 Cryptographic Concepts
Define cipher 1,
Define key 2,
5 steps of digital signature usin...
27  cards
3.1 Secure Protocols
Define dnssec 1,
Define ssh 2,
Define smime 2 3
15  cards
3.2 Securing Hosts & Applications
What vulnerability exists with an...,
Define endpoint detection respons...,
Define data loss prevention dlp 2 3
24  cards
3.3 Secure Network Designs
Define east west traffic 1,
Define north south traffic 2,
Define concept of zero trust 3
36  cards
3.4 Wireless Security
Define counter cbc mac protocol c...,
Define wpa2 2 2,
Define galois counter mode protoc...
24  cards
3.5 Securing Mobile Devices
Define context aware authenticati...,
Define containerization relative ...,
Define storage segmentation relat...
10  cards
3.6 Cloud Security
Define az and its relation to hig...,
Define resource policies in relat...,
Define secrets management in rela...
8  cards
3.7 Identity & Account Management
Define idp 3 1,
3 idp standards 2,
Define attributes relative to ide...
5  cards
3.8 Authentication & Authorization
Define password key 1,
Advantages of using a password va...,
How is hsm implemented for enterp...
21  cards
3.9 Public Key Infrastructure PKI
Define ca 3 1,
Define intermediate ca 2 2,
Define registration authority ra 3
21  cards
4.1 Tools to Assess Security
3 things nmap can identify 1,
Curl 2,
Define hping and 2 capabilities 3
24  cards
4.2 Policies, Procedures & Processes
Define incident response plan 5 1,
Tabletop exercises 2,
Walk through exercise 3
10  cards
4.3 Incident Investigation
Vulnerability scans 1,
Security information and event ma...,
Define sensor relative to siem 3
11  cards
4.4 Post-Incident Mitigation
Actions for endpoint mitigation p...,
Isolation relative to post incide...,
Define containment relative to mi...
7  cards
4.5 Digital Forensics
Define legal hold 1,
Admissibility of digital evidence 2,
Chain of custody 3
29  cards
5.1 Governance - Controls
Define managerial security contro...,
Define operational security contr...,
Define technical security control...
9  cards
5.2 Governance - Regulations, Standards & Frameworks
Define general data protection re...,
Define payment card industry data...,
Define center for internet securi...
9  cards
5.3 Organizational Security Policies
Define acceptable use policy 1,
Security benefit of job rotation 2,
Security benefit of mandatory vac...
16  cards
5.4 Risk Management
Define risk register 1,
Define risk matrix heat map 2,
Define inherit risk 2 3
22  cards
5.5 Data Privacy
Define data minimization 1,
Define data masking 2,
Define data anonymization 3
8  cards

More about
CompTia Security Plus

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Jason Owens's CompTia Security Plus flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security (plus)
  • 2 decks
  • 110 flashcards
  • 17 learners
Decks: Comptia Security Plus, Citrix Xenapp 45 65 Project, And more!
Security Plus
  • 19 decks
  • 555 flashcards
  • 268 learners
Decks: Mastering The Basics Of Security, Exploring Control Types And Methods, Understanding Basic Network Security, And more!
CompTIA Security +
  • 35 decks
  • 2012 flashcards
  • 12 learners
Decks: Fundamentals Of Security, Threat Actors, Physical Security, And more!
CompTIA A+
  • 28 decks
  • 3865 flashcards
  • 720 learners
Decks: Chapter 1 Mobile Devices Mc, Chapter 1 Mobile Devices, Chapter 1 Mobile Devices Key Terms, And more!
Make Flashcards