This class was created by Brainscape user Scott Byrams. Visit their profile to learn more about the creator.

Decks in this class (35)

1.1 Compare and contrast different types of social engineering tecchniques
The process of attempting to obta...,
A social engineering attack that ...,
Phishing done over any telephony ...
33  cards
1.2 Analyze potential indicators to determine the type of attack
Any element of software that perf...,
A form of malware that takes over...,
A means of delivering malicious s...
35  cards
1.3 Analyze potential indicators associated with application attacks
The ability to run any software o...,
When a user account is able to ob...,
A form of malicious code injectio...
41  cards
1.4 Analyze potential indicators associated with network attacks
Used to detect the presence of a ...,
An attack in which a hacker opera...,
May be planted by an employee for...
42  cards
1.5 Explain different threat actor, vectors and intelligence sources
Someone who takes action,
A potential harm,
The person or entity who is respo...
20  cards
1.6 Explain the security concerns associated with various types of vulnerabilities
Newly discovered attacks for whic...,
Increases the risk of data loss d...,
A risk management tool that can p...
6  cards
1.7 Summarize the techniques used in security assessments
The activity of security professi...,
Used to discover weaknesses in de...,
A tool used to scan a target syst...
16  cards
1.8 Explain the techniques used in penetrating testing
A form of security evaluation tha...,
Means everyone in the organizatio...,
Performed without the it or secur...
19  cards
2.1 Explain the Importance of security concepts in an enterprise environment
Helps ensure that systems are dep...,
The initial implementation of a s...,
The concept that once information...
17  cards
2.2 Summarize virtualization and cloud computing concepts
Performing processing and storage...,
Cloud deployment models,
The idea of using storage capacit...
24  cards
2.3 Summarize secure application development, deployment, and automation conpcepts.
This must be configured and segme...,
Where new software code is being ...,
An essential part to the security...
36  cards
2.4 Summarize authentication and authorization design concepts.
Authentication is the act of prov...,
A managed list of network resourc...,
Used to allow clients to interact...
27  cards
2.5 Given a scenario, implement cybersecurity resilience.
The implementation of alternate m...,
The ability of a network system o...,
Redundancy is improved when this ...
21  cards
2.6 Explain the security implications of embedded and specialized systems. (Page 10).
Any form of computing component a...,
A 64 bit microcontroller or a sin...,
A flexible computing device inten...
43  cards
2.7 Explain the importance of physical security controls.
Used to control both foot traffic...,
A small room with two doors one i...,
When an employee is terminated or...
50  cards
2.8 Summarize the basics of cryptographic concepts.
An electronic mechanism used to p...,
Built using the recipient s publi...,
The more critical your data the s...
54  cards
3.1 Implement secure protocols
A security improvement to the exi...,
A secure replacement for telnet t...,
An internet standard for encrypti...
20  cards
3.2 Implement host or application security solutions
An essential security application...,
A more modern and all inclusive t...,
Seeks to detect record evaluate a...
33  cards
3.3 Implement secure network design
9  cards
3.4 Install and configure wireless security settings
0  cards
3.5 Implement secure mobile solutions
0  cards
3.6 Apply cybersecurity solutions to the cloud
0  cards
3.7 Implement identity an account management controls
0  cards
3.8 Implement authentication and authorization solutions.
0  cards
3.9 Implement public key infrastructure
0  cards
4.1 Use the appropriate tool to assess organizational security
0  cards
4.2 The importance of policies, processes, and procedures for incident response.
0  cards
4.3. Utilize appropriate data sources to support an investigation. (Incident)
0  cards
4.4 Apply mitigation techniques or controls to secure an environment.
0  cards
4.5 Explain the key aspects of digital forensics.
0  cards
5.1 Compare and contrast various types of controls.
0  cards
5.2 Explain the importance of applicable regulations, standards, or frameworks that impact organizational security.
0  cards
5.3 Explain the importance of policies to organizational security..
0  cards
5.4 Summarize risk management processes and concepts.
0  cards
5.5 Explain privacy and sensitive data concepts in relation to security..
0  cards

More about
sec+sy0-601

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Scott Byrams's SEC+SY0-601 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security+ (SY0-601) TMM
  • 35 decks
  • 745 flashcards
  • 1 learners
Decks: Security Overview, Malware, Malware Infections, And more!
601 Sec+ Acronyms
  • 1 decks
  • 87 flashcards
  • 4 learners
Decks: Acronyms, And more!
(3) CompTIA Security+ (SY0-601)
  • 35 decks
  • 745 flashcards
  • 17 learners
Decks: Security Overview, Malware, Malware Infections, And more!
601 Review Questions
  • 29 decks
  • 597 flashcards
  • 2 learners
Decks: Missed Questions, Secure Protocols Questions, Acronyms A, And more!
Make Flashcards