This class was created by Brainscape user L PUA. Visit their profile to learn more about the creator.

Decks in this class (134)

Glossary of Terms Page 1
3des,
80211,
8021x
14  cards
Glossary of Terms Page 2
Advanced encryption standard aes,
Advanced encryption standard 256 ...,
Advanced persistent threat apt
14  cards
Glossary of Terms Page 3
Arp poisoning,
Asset,
Asset value av
13  cards
Glossary of Terms Page 4
Basic input output system bios,
Birthday attack,
Blowfish
9  cards
Glossary of Terms Page 5
Bring your own device byod,
Buffer overflow,
Business availability center bac
12  cards
Injection Attacks
Code injection,
Structured query language sql,
What types of code are vulnerable...
6  cards
Buffer Overflows
What is a buffer overflow,
How can buffer overflow be avoided
2  cards
Replay Attack
Replay attack,
Pass the hash,
Cookies
6  cards
Phishing
Social engineering context of inf...,
Spoofing context of information s...,
Typosquatting
11  cards
Impersonation
The pretext,
Impersonation,
Eliciting information
4  cards
Dumpster Diving
Dumpster diving,
Dumpster diving legality,
Protect your rubbish
3  cards
Shoulder Surfing
Shoulder surfing
1  cards
Hoaxes
Hoax
1  cards
Watering Hole Attacks
Watering hole attack
1  cards
Spam
What is spam,
What is spim,
How do you identify and stop spam
6  cards
Influence Campaigns
What is an influence campaign,
How do they conduct an influence ...,
Hybrid warfare
3  cards
Other Social Engineering Attacks
Tailgating,
Policy for visitors,
Invoice scams
4  cards
Principles of Social Engineering
What are principles of social eng...
1  cards
Malware
What is malware,
What does malware do,
How can you avoid malware
4  cards
Viruses
Virus,
Worm,
Virus types
8  cards
Ransomware
What kind of data is ransomware t...,
What does ransomware do,
Crypto malware
4  cards
Trojans and RATs
What is a trojan horse,
Potentially unwanted program pup,
Backdoors
4  cards
Rootkits
What is the root,
What is the kernel,
What is a rootkit
4  cards
Adware
What is adware,
What is spyware,
How do you protect yourself
3  cards
Penetration Testing 1.4
What is a penetration test 601,
Rules of engagement 601,
Known testing options 601
12  cards
Reconnaissance
What are attackers looking for be...,
Passive information,
Open source intelligence osint
5  cards
Security Teams
What is the point of security teams,
Red team,
Blue team
5  cards
Configuration Management
What is the only constant in it s...,
What will be included in diagrams,
Baseline configuration
6  cards
Protecting Data
Organizational data,
Data sovereignty,
Data masking
10  cards
Data Loss Prevention 2.1
Where is your data stored,
Usb blocking,
Cloud based data loss prevention dlp
4  cards
Managing Security
Geographical considerations,
Offsite backups,
Response and recovery controls
8  cards
Vulnerability Types 1.6
Scope of vulnerabilities,
Race condition,
End of life vulnerability
17  cards
Firewalls 2.1
Controls the flow of network traffic,
Network based firewalls,
Stateless firewall
6  cards
VPN Concentrators 2.1
Virtual private network,
Vpn concentrator,
Remote access vpn
12  cards
Network Intrusion Detection and Prevention 2.1
Nids network based intrusion dete...,
Nips network based intrusion prev...,
Out of band response
6  cards
Router and Switch Security 2.1
Routers,
Access control list acl,
Router security challenges
9  cards
Proxies 2.1
Proxies,
Application proxies,
Forward proxy
5  cards
Load Balancers 2.1
What do they do,
Removes more loads,
Methods of balancing
4  cards
Wireless Access Points (WAP) 2.1
Not what you think,
Ssid management service set ident...,
Mac filtering media access control
10  cards
SIEM 2.1
What is siem,
What does it do,
Time synchronization
6  cards
Network Access Control 2.1
Edge vs access control,
Byod policy bring your own device,
Health check posture assessment
7  cards
Mail Gateways 2.1
Unsolicited email,
Email filtering,
Identifying spam
4  cards
Other Security Devices 2.1
Ssl accelerators,
Ssl encryption,
Ssl tls decryption
5  cards
Software Security Tools 2.2
Passive tools,
Active tools,
Protocol analyzer
14  cards
Command Line Security Tools 2.2
Ping,
Netstat,
Traceroute
11  cards
Common Security Issues 2.3
Authentication process issues,
Logs and event anomalies,
Permissions issues
13  cards
Analyzing Security Output 2.4
Host based detection systems,
Endpoint security,
Antivirus
12  cards
Mobile Device Connection Methods 2.5
Cellular networks,
Wi fi,
Satellite communications satcom
7  cards
Mobile Device Management 2.5
Mobile device management mdm,
App management,
Content management
11  cards
Mobile Device Enforcement 2.5
Third party app stores,
Rooting jailbreaking,
Carrier unlocking
13  cards
Mobile Device Deployment Models 2.5
Bring your own device byod,
Corporate owned personally enable...,
Choose your own device cyod
5  cards
Secure Protocols 2.6
Secure real time transport protoc...,
Time synchronization ntp,
S mime secure multipurpose intern...
13  cards
Compliance and Frameworks 3.1
Compliance,
Sarbanes oxly act sox,
The health insurance portability ...
7  cards
Secure Configuration Guides 3.1
Default configs,
Web server hardening,
Web server hardening continued
6  cards
Defense-in-Depth 3.1
Layering of security,
Physical controls,
Technical controls
4  cards
Secure Network Topologies 3.2
Demilitarized zone dmz,
Extranet,
Intranet
8  cards
Network Segmentation 3.2
Segmenting a network,
Physical segmentation,
Logical segmentations with vlans
5  cards
VPN Technologies 3.2
Site to site vpns,
Host to site vpn remote access vpns,
Host to host vpns
3  cards
Security Technology Placement 3.2
Sensors and collectors,
Sensors,
Collectors
7  cards
Securing SDN 3.2
Software defined networking,
Centrally managed
2  cards
Hardware Security 3.3
Full disk encryption fde,
Trusted platform module tpm,
Hardware security module hsm
8  cards
Operating System Security 3.3
Operating system types,
Patch management,
Update options
10  cards
Secure Deployments 3.4
Deployment to production,
Sandboxing,
Secure baselines
3  cards
Embedded Systems 3.5
Supervisory control and data acqu...,
Smart devices internet of things iot,
Heating ventilating air condition...
7  cards
Development Life-Cycle Models 3.6
App development lifecycle,
Waterfall framework,
Agile framework
3  cards
Secure DevOps 3.6
Development and operations,
Security automation,
Continuous integration
5  cards
Version Control and Change Management 3.6
Change is constant,
Version control,
Change management
4  cards
Provisioning and Deprovisioning 3.6
Provisioning,
Orchestration,
Deprovisioning
3  cards
Secure Coding Techniques 3.6
Secure coding concepts,
Error and exception handling,
Input validation
12  cards
Code Quality and Testing 3.6
Static application security testi...,
Dynamic analysis fuzzing,
Stress testing
7  cards
Virtualization 3.7
One computer many os,
The hypervisor,
Hypervisor types
3  cards
Virtualization Security 3.7
Vm sprawl avoidance,
Vm escape protection
2  cards
Cloud Deployment Models 3.7
Software as a service saas,
Infrastructure as a service iaas,
Platform as a service paas
4  cards
Security in the Cloud 3.7
On premise hosted and cloud,
Cloud storage,
Virtual desktop infrastructure vdi
5  cards
Resiliency and Automation 3.8
Automation and scripting,
Templates,
Master images
5  cards
Redundancy, Fault Tolerance, and High Availability 3.8
Distributive allocation,
Redundancy and fault tolerance,
Redundant array of indapendant di...
12  cards
Physical Security Controls 3.9 Part 1
Proper lighting,
Signs,
Fencing
10  cards
Physical Security Controls 3.9 Part 2
Man traps,
Faraday cage,
Door access controls
13  cards
AAA and Authentication 4.1
Aaa framework,
Multi factor authentication,
Something you are
10  cards
Identity and Access Service 4.2
Remote authentication dial in use...,
Terminal access controller access...,
Lightweight directory access prot...
8  cards
PAP, CHAP, MS-CHAP 4.2
Point to point protocol ppp authe...,
Password authentication protocol pap,
Challenge handshake authenticatio...
4  cards
Federated Identities 4.2
Server based authentication,
Stateless protocol,
Token based authentication
5  cards
Access Control Models 4.3
Access control,
Mandatory access control mac,
Discretionary access control dac
8  cards
Access Control Technologies 4.3
Proximity cards,
Smart cards,
Biometric factors
8  cards
Account Types 4.4
User accounts,
Shared and generic accounts,
Service accounts
4  cards
Account Management 4.4
Least privilege,
On boarding new hires or transfers,
Off boarding
9  cards
Account Policy Enforcement 4.4
Credential management,
Configuration settings,
Group policy control
6  cards
Agreement Types 5.1
Standard operating procedures,
Interoperability agreements,
Common agreements service level a...
7  cards
Personnel Management 5.1
Business policies,
Job rotation,
Separation of duties
9  cards
Role Based Awareness Training 5.1
Specialized training,
Roles data owner,
Roles system administrator
7  cards
General Security Policies 5.1
Social media policies,
Personal email policies
2  cards
Business Impact Analysis 5.2
Mean time to restore mttr,
Mean time to failure mttf,
Mean time between failure mtbf
12  cards
Risk Assessment 5.3
Threat assessments,
Quantitative risk calculation,
Evaluating risk
8  cards
Incident Response Planning 5.4
Security incidents,
Roles and responsibilities,
Incident notification
5  cards
Incident Response Process 5.4
National institute of standards a...,
Perparation,
The challenge of detection
10  cards
Gathering Forensic Data 5.5
Forensic procedures,
Order of volatility,
Chain of custody
11  cards
Using Forensics Data 5.5
Preservation,
Recovery,
Track man hours and expenses
3  cards
Disaster Recovery Sites 5.6
Cold site,
Warm site,
Hot site
3  cards
Application Recovery 5.6
Order of restoration,
Backup strategies,
File backups
6  cards
Geographic Considerations 5.6
Selecting offsite recover options,
Off site backups,
Distance
4  cards
Continuity of Operations 5.6
Tabletop exercises,
The scope,
After action report aar
5  cards
Security Controls 5.7
Security controls,
Control types,
Deterrent
5  cards
Data Destruction 5.8
Data destruction and media saniti...,
Protect your rubbish,
Physical destruction
5  cards
Handling Sensitive Data 5.8
Labeling sensitive data,
Data sensitivity labels,
Sensitive data types
3  cards
Data Roles and Retention 5.8
Data roles,
Data steward,
Data custodian
5  cards
Cryptography Concepts 6.1
Cryptography,
Cryptography terms,
Cryptographic keys
8  cards
Symmetric and Asymmetric Encryption 6.1
Symmetric encryption,
Asymmetric encryption,
The key pair
4  cards
Hashing and Digital Signatures 6.1
Hashes,
Collision,
Hashing practical use
4  cards
Randomizing Cryptography 6.1
Cryptographic nonce,
Initialization vectors,
Salt
3  cards
Weak Encryption 6.1
Strength of encryption,
Weak algorithms,
Strong algorithms
4  cards
Cryptographic Keys 6.1
The key is the key,
Key strength,
Key exchange
4  cards
Steganography 6.1
Obfuscation,
Steganography,
Common steganography techniques
3  cards
Stream and Block Ciphers 6.1
Stream cipher,
Block cipher
2  cards
States of Data 6.1
Data in transit data in motion,
Data at rest,
Data in use
3  cards
Perfect Forward Secrecy 6.1
Traditional web server encryption,
Perfect forward secrecy pfs
2  cards
Common Cryptography Use Cases 6.1
Finding the balance,
Use cases,
Use cases cont
3  cards
Symmetric Algorithms 6.2
Data encryption standard des,
Triple des 3des,
Rivest cipher 4 rc4
7  cards
Block Cipher Modes 6.2
Block cipher mode of operation,
What is padding,
Padding methods
7  cards
Asymmetric Algorithms 6.2
Diffie hellman key exchange,
Rivest shamir adelman rsa,
Digital signature algorithm dsa
7  cards
Hashing Algorithms 6.2
Md5 message digest algorithm,
Secure hash algorithm sha,
Hash based message authentication...
4  cards
Key Stretching Algorithms 6.2
Key strengething,
Key stretching libraries
2  cards
Obfuscation 6.2
Obfuscation,
Excluseive or xor cipher,
Substitution cipher
5  cards
Wireless Cryptographic Protocols 6.3
Wireless encryption,
Wired equivalent privacy wep,
Wi fi protected access wpa
6  cards
Wireless Security 6.3
Wpa psk,
Wpa enterprise,
Captive portal
4  cards
PKI Components 6.4
Public key infrastructure pki,
Key generation,
Digital certificates
10  cards
PKI Concepts 6.4
Online and offline ca s,
Online certificate status protoco...,
Pinning
7  cards
Types of Certificates 6.4
Root certificate,
Web server ssl certificates,
Web server ssl certificates cont
8  cards
Certificate File Formats 6.4
X509 v3 digital certificates,
Distinguished encoding rules der,
Privacy enhanced mail pem
7  cards
Ports & Protocols
Dns tcp udp port 53,
Ssh tcp port 22,
Telnet tcp port 23
26  cards
Important Acronyms Ch 6 Network Components
Arp,
Dll,
Nat firewalls
21  cards
Important Acronyms Chapter 7
Ping,
Netstat,
Tracert
13  cards
Chapter 16 Resiliency and Automation Strategies
Raid 0,
Raid 1,
Raid 2
7  cards
CompTia Ports
Tcp port 20,
Tcp port 21,
Tcp port 22
19  cards
Exam Premium Practice Test A Review Cards
Ccmp,
Erm,
Pat
5  cards

More about
CompTIA Security+ SY0-501

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study L PUA's CompTIA Security+ SY0-501 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security+ (SY0-501) Terms, Co...
  • 11 decks
  • 908 flashcards
  • 12 learners
Decks: Threats Vulnerabilities Attacks, Security Glossary, Osi Model, And more!
COMPTIA SY0-501 Security+
  • 12 decks
  • 218 flashcards
  • 7 learners
Decks: Tcp Ports, Udp Ports, Wi Fi Specifications, And more!
CompTIA Security+ SY0-501 by Glen E. ...
  • 48 decks
  • 593 flashcards
  • 30 learners
Decks: Ch19 Understanding Monitoring And Auditi, Ch18 1802 Performing A Security Assessme, Ch18 1801 Understanding Types Of Assessm, And more!
My Security+ SY0-501 Acronyms
  • 3 decks
  • 572 flashcards
  • 76 learners
Decks: Security Syo 501 Acronyms, Security Syo 501 Quiz, Book 1, And more!
Make Flashcards