This class was created by Brainscape user Alex valentine. Visit their profile to learn more about the creator.

Decks in this class (30)

Threats, Attacks, and Vulnerabilities (1)
John is analyzing strange behavio...,
Ahmed is a sales manager with a m...,
You are a security administrator ...
30  cards
Threats, Attacks, and Vulnerabilities (2)
When phishing attacks are so focu...,
You are concerned about a wide ra...,
You work for a large retail compa...
30  cards
Threats, Attacks, and Vulnerabilities (3)
You are performing a penetration ...,
Mary has discovered that a web ap...,
An attacker is trying to get acce...
30  cards
Threats, Attacks, and Vulnerabilities (4)
Fares is the ciso of a bank he ha...,
You are responsible for technical...,
An attacker is trying to get malf...
30  cards
Threats, Attacks, and Vulnerabilities (5)
Which of the following type of te...,
What type of attack is an nfc mos...,
John has been asked to do a penet...
30  cards
Technologies and Tools (1)
John is looking for a new firewal...,
You are responsible for network s...,
Ahmed is responsible for vpn conn...
29  cards
Technologies and Tools (2)
You are concerned about an attack...,
You have been asked to implement ...,
Ahmed is responsible for voip at ...
29  cards
Technologies and Tools (3)
You are responsible for security ...,
Mary is concerned that siem logs ...,
Elizabeth is responsible for siem...
29  cards
Technologies and Tools (4)
Sheila is responsible for data ba...,
Frank is a web server administrat...,
Mike is responsible for testing s...
29  cards
Technologies and Tools (5)
You work for a large bank the ban...,
Francine is concerned about emplo...,
You are responsible for mobile de...
26  cards
Architecture and Design (1)
Caroline has been asked to find a...,
You are responsible for network s...,
Cheryl is responsible for cyberse...
30  cards
Architecture and Design (2)
You have been asked to implement ...,
Joanne works for a large insuranc...,
John is installing an hvac system...
30  cards
Architecture and Design (3)
You are responsible for database ...,
Mary is concerned about applicati...,
Fares is responsible for managing...
30  cards
Architecture and Design (4)
Vincent works for a company that ...,
Mile is concerned about securing ...,
Ariel is responsible for software...
30  cards
Architecture and Design (5)
Emily manages the ids ips for her...,
You have been instructed to find ...,
Jacob is the cio for a mid sized ...
29  cards
Identity and Access Management (1)
Jack is using smart cards for aut...,
Carole is responsible for various...,
You are selecting an authenticati...
29  cards
Identity and Access Management (2)
You are looking for an authentica...,
Gerard is trying to find a flexib...,
Emiliano is considering voice rec...
29  cards
Identity and Access Management (3)
Laura is a security admin for a m...,
Charles is a ciso for an insuranc...,
Robert is using pap for authentic...
28  cards
Risk Management (1)
You are a manager of a bank and y...,
Which of the following principles...,
Why are penetration test often no...
30  cards
Risk Management (2)
You are the security administrato...,
You are an it administrator for a...,
Your company is partnering with a...
30  cards
Risk Management (3)
Which of the following are consid...,
You are a member of your company ...,
You are a security administrator ...
30  cards
Risk Management (4)
Which of the following secures ac...,
You are a server administrator fo...,
You are replacing a number of dev...
30  cards
Risk Management (5)
A sql database server is schedule...,
You are planning to perform a sec...,
Your company has hired a new admi...
30  cards
Cryptography and PKI (1)
Which of the following would a pu...,
Your company s web server certifi...,
Mary is concerned about the valid...
30  cards
Cryptography and PKI (2)
Which of the following eap types ...,
Which of the following is an encr...,
Which of the following cryptograp...
30  cards
Cryptography and PKI (3)
Which of the following statements...,
Which of the following ciphers wa...,
Katelyn is sending an important e...
30  cards
Cryptography and PKI (4)
Zack an administrator needs to re...,
Which of the following types of e...,
Which of the following is used to...
30  cards
Cryptography and PKI (5)
The cio has instructed you to set...,
Which of the following encryption...,
When setting up a secure wireless...
29  cards
Practice Test (1)
You are asked to separate the sal...,
You are a network administrator a...,
Which of the following is a certi...
50  cards
Practice Test (2)
One of your colleagues attempted ...,
Which of the following defines th...,
You are a system administrator an...
48  cards

More about
CompTIA Security+ Practice Tests: Exam SY0-501

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Alex valentine's CompTIA Security+ Practice Tests: Exam SY0-501 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security+ SY0-501 - Based on ...
  • 45 decks
  • 887 flashcards
  • 502 learners
Decks: 10 Threats Attacks And Vulnerabilities 2, 11 Given A Scenario Analyze Indicators O, 12 Compare And Contrast Types Of Attacks, And more!
ag-CompTIA Security+ Practice Tests: ...
  • 30 decks
  • 924 flashcards
  • 8 learners
Decks: Threats Attacks And Vulnerabilities 1, Threats Attacks And Vulnerabilities 2, Threats Attacks And Vulnerabilities 3, And more!
Make Flashcards