Security+ SY0-601

This class was created by Brainscape user David Wartman. Visit their profile to learn more about the creator.

Decks in this class (37)

1.0 Acronyms
3des 1,
Aaa 2,
Abac 3
292  cards
1.1 Social Engineering Techniques
What is it called when somebody a...,
Phishing that uses phone calls as...,
This tactic involves spoofing an ...
22  cards
1.2 Malware Types
This type of virus never actually...,
What is maas 2,
What are two keylogger examples 3
47  cards
1.3 Application Attacks
This type of attack involves gain...,
This type of attack is the most c...,
This type of xss attack involves ...
25  cards
1.4 Network Attacks
Unauthorized access point on a ne...,
Malicious access point that has t...,
The process of sending unsolicite...
23  cards
1.5 Threat Actors, Vectors, Intelligence Sources
Actor inside the organization low...,
Actor governmental high sophistic...,
Actor has a strong purpose for so...
39  cards
1.6 Vulnerability Types
This type of attack is becoming i...,
Attacks that involve attackers wa...,
What are some good practices for ...
12  cards
1.7 Security Assessment Techniques
Threat hunting is a game of cat a...,
This is the process of combining ...,
What are the 3 main steps of inte...
14  cards
1.8 Pen Testing Techniques
This document is used to define t...,
What is the difference between a ...,
Why is it important for a pentest...
17  cards
2.1 Security Concepts in Enterprise Environments
Why is it important to keep up wi...,
This is the configuration to whic...,
Data that resides in a country is...
30  cards
2.2 Virtualization and Cloud Computing
Cloud model sometimes called hard...,
Cloud model 2,
Cloud model 3
24  cards
2.3 Application Development, Deployment, Automation Concepts
The practice of developing apps i...,
What two steps are critical to pe...,
These are created in order to def...
18  cards
2.4 Authentication and Authorization Design Concepts
What is the best way to mitigate ...,
Allows network access to other th...,
Verification that hardware on you...
19  cards
2.5 Implement Cybersecurity Resilience
Give the characteristics of raid 0 1,
Describe the characteristics of r...,
Striping with parity fault tolera...
28  cards
2.6 Embedded and Specialized Systems
Hardware and software designed fo...,
This small form factor system inv...,
An integrated circuit that can be...
14  cards
2.7 Physical Security Controls
What type of physcial control wou...,
A type of man trap that only allo...,
Prevents the data functionality o...
16  cards
2.8 Basic Cryptographic Concepts
An unencrypted message in the cle...,
An encrypted message 2,
The algorithm used to encrypt dec...
37  cards
3.1 Implement Secure Protocols
Protocol used for secure real tim...,
Secure protocol used for time syn...,
Public key encryption and digital...
17  cards
3.2 Implement Host or Application Security Solutions
A method of enpoint threat protec...,
What are the 3 steps to edr 2,
Endpoint protection method that i...
27  cards
3.3 Implement Secure Network Designs
Previously known as the dmz and a...,
A private network for partners li...,
Holistic approach to network secu...
43  cards
3.4 Install and Configure Secure Wireless Settings
Wifi encryption that utilizes ccm...,
Wifi encryption that utlizes gcmp...,
What is used to ensure data confi...
20  cards
3.5 Implement Secure Mobile Solutions
Mobile network connection used to...,
What are the three main concerns ...,
Management practice that allows a...
17  cards
3.6 Apply Cybersecurity Solutions to the Cloud
0  cards
3.7 Implement Identity and Account Management Controls
0  cards
3.8 Implement Authentication and Authorization Solutions
0  cards
3.9 Implement Public Key Infrastructure
Policies procedures hardware soft...,
What are the 6 steps to the publi...,
What is the only way to trust a c...
22  cards
4.1 Assess Organizational Security
0  cards
4.2 Policies, Processes and Procedures for Incident Response
0  cards
4.3 Use Data Sources to Support Investigations
0  cards
4.4 Apply Mitigation Techniques and Controls After an Incident
0  cards
4.5 Key Aspects of Digital Forensics
0  cards
5.1 Types of Controls
0  cards
5.2 Importance of Regulations, Standards, Frameworks Impact
0  cards
5.3 Importance of Policies on Organizational Security
0  cards
5.4 Risk Management Processes and Concepts
0  cards
5.5 Privacy and Sensitive Data Concepts
0  cards
Incorrect Study Questions
Frank wants to verify that no unn...,
Ahmed has hundreds of systems spr...,
Frank finds that an attacker has ...
9  cards

More about
Security+ SY0-601

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study David Wartman's Security+ SY0-601 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security+ (SY0-601)
  • 35 decks
  • 745 flashcards
  • 2144 learners
Decks: Security Overview, Malware, Malware Infections, And more!
Make Flashcards