Brainscape
Find Flashcards
Discover millions of Flashcards
Browse Brainscape-Certified Flashcards
Learn faster with our catalog of expert certified, pre-made flashcards.
Browse All Flashcards
Browse our full catalog of user-generated and Brainscape-Certified flashcards.
Explore the
Knowledge Genome
of subjects:
Entrance Exams
Professional Certifications
Foreign Languages
Medical & Nursing
Science
English
Humanities & Social Studies
Mathematics
Law
Vocations
Health & Fitness
Business & Finance
Technology & Engineering
Food & Beverage
Fine Arts
Random Knowledge
Make Flashcards
How It Works
Features Overview
The Science of Studying
Educators
Schools & Teachers
Tutors & Resellers
Businesses
Employee Training
Publishers & Resellers
Academy
Academy Homepage
The Science of Studying
Study Tips
Teaching Tips
Employee Training Tips
Language Learning Tips
Test Prep Tips
Log in
My Dashboard
Get Started
Log out
CompTIA Security+
> 15B: Apply Cloud Security Solutions > Flashcards
15B: Apply Cloud Security Solutions Flashcards
(0 cards)
Study These Flashcards
CompTIA Security+
flashcards
Decks in class (61)
# Cards
1A: Compare and Contrast Information Security Roles
34
1B: Compare and Contrast Security Control and Framework Types
38
2A: Explain Threat Actor Types and Attack Vectors
31
2B: Explain Threat Intelligence Sources
0
3A: Assess Organizational Security with Network Reconnaissance Tools
0
3B: Explain Security Concerns with General Vulnerability Types
0
3C: Summarize Vulnerability Scanning Techniques
0
3D: Explain Penetration Testing Concepts
0
4A: Compare and Contrast Social Engineering Techniques
0
4B: Analyze Indicators of Malware-Based Attacks
0
5A: Compare and Contrast Cryptographic Ciphers
0
5B: Summarize Cryptographic Modes of Operation
0
5C: Summarize Cryptographic Use Cases and Weaknesses
0
5D: Summarize Other Cryptographic Technologies
0
6A: Implement Certificates and Certificate Authorities
0
6B: Implement PKI Management
0
7A: Summarize Authentication Design Concepts
0
7B: Implement Knowledge-Based Authentication
0
7C: Implement Authentication Technologies
0
7D: Summarize Biometrics Authentication Concepts
0
8A: Implement Identity and Account Types
0
8B: Implement Account Policies
0
8C: Implement Authorization Solutions
0
8D: Explain the Importance of Personnel Policies
0
9A: Implement Secure Network Designs
0
9B: Implement Secure Switching and Routing
0
9C: Implement Secure Wireless Infrastructure
0
9D: Implement Load Balancers
0
10A: Implement Firewalls and Proxy Servers
0
10B: Implement Network Security Monitoring
0
10C: Summarize the Use of SIEM
0
11A: Implement Secure Network Operations Protocols
0
11B: Implement Secure Application Protocols
0
11C: Implement Secure Remote Access Protocols
0
12A: Implement Secure Firmware
0
12B: Implement Endpoint Security
0
12C: Explain Embedded System Security Implications
0
13A: Implement Mobile Device Management
0
13B: Implement Secure Mobile Device Connections
0
14A: Analyze Indicators of Application Attacks
0
14B: Analyze Indicators of Web Application Attacks
0
14C: Summarize Secure Coding Practices
0
14D: Implement Secure Script Environments
0
14E: Summarize Deployment and Automation Concepts
0
15A: Summarize Secure Cloud and Virtualization Services
0
15B: Apply Cloud Security Solutions
0
15C: Summarize Infrastructure as Code Concepts
0
16A: Explain Privacy and Data Sensitivity Concepts
0
16B: Explain Privacy and Data Protection Controls
0
17A: Summarize Incident Response Procedures
0
17B: Utilize Appropriate Data Sources for Incident Response
0
17C: Apply Mitigation Controls
0
18A: Explain Key Aspects of Digital Forensics Documentation
0
18B: Explain Key Aspects of Digital Forensics Evidence Acquisition
0
19A: Explain Risk Management Processes and Concepts
0
19B: Explain Business Impact Analysis Concepts
0
20A: Implement Redundancy Strategies
0
20B: Implement Backup Strategies
0
20C: Implement Cybersecurity Resiliency Strategies
0
21A: Explain the Importance of Physical Site Security Controls
0
21B: Explain the Importance of Physical Host Security Controls
0