This class was created by Brainscape user Brandon R. Visit their profile to learn more about the creator.

Decks in this class (16)

Practical Cryptography
Which is a common symmetric key b...,
Which is a scalable way to bind a...,
Which algorithm uses smaller key ...
9  cards
Identity and Access Management
Which biometric modality is the m...,
Which of these authentication fac...,
Which of these is a strict mathem...
7  cards
Architecture & Infrastructure Concepts
Which are common examples of scad...,
Which type of hypervisor is also ...,
Which term describes the provisio...
10  cards
Enterprise Infrastructure Security Principles
Which assigned port is used for h...,
Which term describes all possible...,
What is the preferred security so...
8  cards
Computing Resources Security Techniques
Which application testing methodo...,
Which mobile device provisioning ...,
Which stage of an asset managemen...
8  cards
Enterprise Security Capabilities
Which term refers to a network ar...,
Which security service examines o...,
Which ips tuning scenario involve...
11  cards
Security Goals & Controls
What is a strict mathematical mod...,
What is the process of granting a...,
Which security goal controls an a...
8  cards
Security Monitoring and Alerting
Which form of monitoring leverage...,
What is a solution that helps ent...,
Which authentication model is use...
8  cards
Automation, Orchestration, and Incident Response
What is defined as a factor that ...,
Which statement is true when cons...,
Which type of incident response t...
8  cards
Resilience and Recovery
Which technology solution is desi...,
Which technology widely used in d...,
Which business impact metric meas...
7  cards
Survey of Malicious Activities
Which is a type of brute force at...,
Which popular form of malware enc...,
Which type of attack leverages a ...
7  cards
Audits, Assessments, and Awareness
What is a more cost effective ass...,
What is the first step in the pen...,
Which are used to certify securit...
6  cards
Effective Security Governance
Which term refers to advice or in...,
What allows an information techno...,
What describes the actions an org...
7  cards
Risk Management
Which risk treatment approach inv...,
Which is a form of structured dat...,
Which are common types of securit...
7  cards
Mitigation Techniques
Which security practice involves ...,
Which security service helps prot...,
What is a set of data tools utili...
8  cards
Data Protection Concepts and Strategies
What is the most stringent privac...,
Which type of corporate data clas...,
What is a process of dividing and...
8  cards

More about
Security+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Brandon R's Security+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Make Flashcards