This class was created by Brainscape user Nicholas McCarthy. Visit their profile to learn more about the creator.

Decks in this class (21)

Study Guide - Assessment Test
1 after running an nmap scan of a...,
4 which of the following vulnerab...,
Security researchers recently dis...
22  cards
Study Guide - Chapter 2: System and Network Architecture
1 naomi wants to make her applica...,
Sase 2,
3 tom wants to set an appropriate...
24  cards
Study Guide - Chapter 3: Malicious Activity
1 which of the following linux co...,
Lsof 2,
2 what windows tool provides deta...
26  cards
Study Guide - Chapter 4: Threat Intelligence
1 which of the following measures...,
3 which of the following activiti...,
Threat intelligence cycle steps 3
22  cards
Study Guide - Chapter 5: Reconnaissance and Intelligence Gathering
1 megan wants to use the metasplo...,
Wmap 2,
Smb_login 3
22  cards
Study Guide - Chapter 6: Designing a Vulnerability Management Program
1 what federal law requires the u...,
Fisma 2,
Glba 3
26  cards
Study Guide - Chapter 7: Analyzing Vulnerability Scans
1 tom is reviewing a vulnerabilit...,
2 which one of the cvss metrics w...,
Cvss metrics 3
15  cards
Study Guide - Chapter 8: Responding to Vulnerabilities
1 jen identified a missing patch ...,
2 you notice a high number of sql...,
3 aziz is responsible for the adm...
24  cards
Study Guide - Chapter 9: Building an Incident Response Program
1 which one of the following is a...,
2 during what phase of the incide...,
Phases of the incident response p...
20  cards
Study Guide - Chapter 10: Incident Detection and Analysis
2 hui wants to comply with a lega...,
5 renee wants to adopt an open io...,
6 chris wants to use an active mo...
14  cards
Study Guide - Chapter 11: Containment, Eradication, and Recover
2 which one of the following crit...,
3 alice is responding to a cybers...,
4 alice confers with other team m...
23  cards
Study Guide - Chapter 12: Reporting and Communication
1 why should organizations predet...,
Valentine is preparing a vulnerab...,
3 jake wants to identify stakehol...
11  cards
Study Guide - Chapter 13: Performing Forensic Analysis and Techniques for Incident Response
1 which format does dd produce fi...,
3 mike is conducting a root cause...,
Dd 3
21  cards
Study Guide - Practice Exam 1
9 kevin is configuring a web base...,
Webhook 2,
11 saanvi is starting his inciden...
44  cards
Practice Tests - Chapter 1: Domain 1.0: Security Operations
4 what term is used to describe t...,
Isac 2,
5 singh incorporated the cisco ta...
184  cards
Practice Tests - Chapter 2: Domain 2.0: Vulnerability Management
1 during the reconnaissance stage...,
Database vendor default ports 2,
3 during a port scan of her netwo...
186  cards
NMap Info
What is nmap 1,
What are the key functions of nmap 2,
What is the basic command to perf...
40  cards
Practice Tests - Chapter 3: Domain 3.0: Incident Response and Management
Parts of the diamond model 1,
Cyber kill chain steps 2,
6 jamal wants to leverage a frame...
114  cards
Practice Tests - Chapter 4: Reporting and Communication
4 ben is preparing to conduct a v...,
6 grace ran a vulnerability scan ...,
9 gene runs a vulnerability scan ...
48  cards
Practice Tests - Practice Test 1
4 during his investigation of a w...,
5 as part of her soc analyst duti...,
6 what does the nmap response fil...
35  cards
Practice Tests - Practice Test 2
3 rowan ran a port scan against a...,
4 evan is troubleshooting a vulne...,
5 sam is looking for evidence of ...
41  cards

More about
CySA+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Nicholas McCarthy's CySA+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Comptia CYSA+
  • 37 decks
  • 1033 flashcards
  • 81 learners
Decks: Threat Intelligence Sharing, Classifying Threats, Network Forensics, And more!
CYSA+
  • 14 decks
  • 513 flashcards
  • 98 learners
Decks: Chapter 1 Defending Against Cybersecurit, Chapter 2 Reconnaissance And Intelligenc, Chapter 3 Designing A Vulnerability Mana, And more!
CySA+ CS0-001
  • 26 decks
  • 1506 flashcards
  • 88 learners
Decks: 10 Threat Management, 11 Threat Management, 12 Threat Management, And more!
CySA+
  • 9 decks
  • 405 flashcards
  • 55 learners
Decks: Lesson 1, Lesson 2 Using Threat Intelligence, Lesson 3 Reconnaissance And Intelligence, And more!
Make Flashcards