This class was created by Brainscape user Tánh Phạm. Visit their profile to learn more about the creator.

Decks in this class (45)

1.0 Threats, Attacks and Vulnerabilities (21%)
0  cards
1.1 Given a scenario, analyze indicators of compromise and determine the type of malware.
Virus,
Crypto malware,
Ransomware
13  cards
1.2 Compare and contrast types of attacks.
Social engineering phishing,
Social engineering spear phishing,
Social engineering whaling
61  cards
1.3 Explain threat actor types and attributes.
Types of actors script kiddies,
Types of actors hacktivist,
Types of actors organized crime
11  cards
1.4 Explain penetration testing concepts.
Active reconnaissance,
Passive reconnaissance,
Pivot
10  cards
1.5 Explain vulnerability scanning concepts.
Passively test security controls,
Identify vulnerability,
Identify lack of security controls
7  cards
1.6 Explain the impact associated with types of vulnerabilities.
Race conditions,
Vulnerabilities due to end of lif...,
Vulnerabilities due to embedded s...
22  cards
2.0 Technologies and Tools (22%)
0  cards
2.1 Install and configure network components, both hardware and software-based, to support organizational security.
Firewall acl,
Firewall application based vs net...,
Firewall stateful vs stateless
76  cards
2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization.
Protocol analyzer,
Network scanners,
Network scanners rogue system det...
25  cards
2.3 Given a scenario, troubleshoot common security issues.
Unencrypted credentials clear text,
Logs and events anomalies,
Permission issues
22  cards
2.4 Given a scenario, analyze and interpret output from security technologies.
Hids hips,
Antivirus,
File integrity check
12  cards
2.5 Given a scenario, deploy mobile devices securely.
Connection methods,
Connection methods cellular,
Connection methods wifi
45  cards
2.6 Given a scenario, implement secure protocols
Protocols,
Protocols dnssec,
Protocols ssh
22  cards
3.0 Architecture and Design (15%)
0  cards
3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides.
Industry standard frameworks and ...,
Industry standard frameworks and ...,
Industry standard frameworks and ...
18  cards
3.2 Given a scenario, implement secure network architecture concepts.
Zones topologies,
Zones topologies dmz,
Zones topologies extranet
31  cards
3.3 Given a scenario, implement secure systems design.
Hardware firmware security,
Hardware firmware security fde sed,
Hardware firmware security tpm
31  cards
3.4 Explain the importance of secure staging deployment concepts.
Sandboxing,
Environment,
Environment development
8  cards
3.5 Explain the security implications of embedded systems.
Scada ics,
Smart devices iot,
Smart devices iot wearable techno...
10  cards
3.6 Summarize secure application development and deployment concepts.
Development life cycle models,
Development life cycle models wat...,
Secure devops
30  cards
3.7 Summarize cloud and virtualization concepts.
Hypervisor,
Hypervisor type i,
Hypervisor type ii
19  cards
3.8 Explain how resiliency and automation strategies reduce risk.
Automation scripting,
Automation scripting automated co...,
Automation scripting continuous m...
21  cards
3.9 Explain the importance of physical security controls.
Lighting,
Signs,
Fencing gate cage
27  cards
4.0 Identity and Access Management (16%)
0  cards
4.1 Compare and contrast identity and access management concepts
Identification authentication aut...,
Multifactor authentication authen...,
Multifactor authentication someth...
10  cards
4.2 Given a scenario, install and configure identity and access services.
Ldap,
Kerberos,
Tacacs
13  cards
4.3 Given a scenario, implement identity and access management controls.
Access control models,
Access control models mac,
Access control models dac
29  cards
4.4 Given a scenario, differentiate common account management practices.
Account types,
Account types user account,
Account types shared and genetic ...
28  cards
5.0 Risk Management (14%)
0  cards
5.1 Explain the importance of policies, plans and procedures related to organizational security.
Standard operating procedure sop ...,
Agreement types,
Agreement types bpa
28  cards
5.2 Summarize business impact analysis concepts.
Rto rpo,
Mtbf,
Mttr bonus mttf
14  cards
5.3 Explain risk management processes and concepts.
Threat assessment,
Threat assessment environmental,
Threat assessment manmade
25  cards
5.4 Given a scenario, follow incident response procedures.
Incident response plan,
Incident response plan documented...,
Incident response plan roles and ...
13  cards
5.5 Summarize basic concepts of forensics
Order of volatility,
Chain of custody,
Legal hold
16  cards
5.6 Explain disaster recovery and continuity of operations concepts.
Recovery sites,
Recovery sites hot site,
Recovery sites warm site
23  cards
5.7 Compare and contrast various types of controls
Deterrent a class of controls,
Preventive a class of controls,
Detective a class of controls
9  cards
5.8 Given a scenario, carry out data security and privacy practices
Data destruction and media saniti...,
Data destruction and media saniti...,
Data destruction and media saniti...
21  cards
6.0 Cryptography and PKI (12%)
0  cards
6.1 Compare and contrast basic concepts of cryptography.
Symmetric algorithms,
Modes of operation,
Asymmetric algorithms
39  cards
6.2 Explain cryptography algorithms and their basic characteristics
Symmetric algorithms,
Symmetric algorithms aes,
Symmetric algorithms des
33  cards
6.3 Given a scenario, install and configure wireless security settings
Cryptographic protocols,
Cryptographic protocols wpa,
Cryptographic protocols wpa2
17  cards
6.4 Given a scenario, implement public key infrastructure.
Components,
Components ca certificate authority,
Components intermediate ca subord...
43  cards
CompTIA Security+ Acronyms
0  cards
Security+ Proposed Hardware and Software List
Equipment,
Spare parts hardware,
Hardware tools
5  cards

More about
CompTIA Security+ SY0-501 - Based on Objectives

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Tánh Phạm's CompTIA Security+ SY0-501 - Based on Objectives flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security+ Practice Tests: Exa...
  • 30 decks
  • 924 flashcards
  • 370 learners
Decks: Threats Attacks And Vulnerabilities 1, Threats Attacks And Vulnerabilities 2, Threats Attacks And Vulnerabilities 3, And more!
Make Flashcards