This class was created by Brainscape user Victor Mendez. Visit their profile to learn more about the creator.

Decks in this class (17)

Ports & Protocols
15,
20,
21
18  cards
Chapter 2 Key Terms
Spreading rapidly to other system...,
The nefarious actions the malware...,
A false warning often contained i...
30  cards
Ch 3 Key Terms
The practice of transforming info...,
Hides the existence of the data t...,
The process of changing the origi...
33  cards
Ch 4 Key Terms
Three primary characteristics ran...,
After being encrypted each cipher...,
Requires that both the message se...
26  cards
Ch 5 Key Terms
Introduce new input to exploit a ...,
Imitates another computers ip add...,
When the user is tricked into cli...
25  cards
Over The Wire Notes
Level 0,
0 to 1,
1 to 2
11  cards
Ch 7 Key Terms
A microsoft windows feature that ...,
All security services are deliver...,
Although the control port 21 comm...
20  cards
Ch 8 Key Terms
Secure tunnels client password au...,
A centrally located wlan connecti...,
Designed to help users who have l...
20  cards
Security+ Questions, Ch 6
A computer on a company network w...,
Malicious traffic from an interna...,
An organization is using a tool t...
14  cards
Security+ Midterm
Which of the following specifical...,
When designing a web based client...,
Which of the following could occu...
60  cards
Ch 9 Key Terms
Passive devices to restrict acces...,
Quality assurance test to verify ...,
A network that moves a product fr...
20  cards
Ch 10 Key Terms
Using your own personal mobile de...,
Ensures that only preapproved app...,
Prevents the mobile device from b...
20  cards
Ch 12 Key Terms
Validate credentials as genuineau...,
A hierarchy based on the labels i...,
Provide file system security for ...
25  cards
Ch 13 Key Terms
Hardware software that captures p...,
Used by network admins for networ...,
A range of products that look for...
35  cards
Ch 14 Key Terms
The activity that serves as the c...,
Can achieve high data transfer ra...,
Development of strategic plans th...
33  cards
Ch 15 Key Terms
Permission to perform a cyber sec...,
Calculates the avg amount of time...,
Prevents the threat from coming i...
33  cards
Final Exam
Which of the following would enha...,
The help desk received a call aft...,
A company has a data classificati...
75  cards

More about
Security+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Victor Mendez's Security+ flashcards for their Western Technical College class now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Security+ Practice exams
  • 38 decks
  • 2776 flashcards
  • 169 learners
Decks: Professor Messer Practice Questions, Comptia Practice Questions, Comptia Review Questions, And more!
Security +
  • 26 decks
  • 1501 flashcards
  • 227 learners
Decks: Deck A, Deck B, Deck C, And more!
Make Flashcards