Brainscape
Find Flashcards
Discover millions of Flashcards
Browse Brainscape-Certified Flashcards
Learn faster with our catalog of expert certified, pre-made flashcards.
Browse All Flashcards
Browse our full catalog of user-generated and Brainscape-Certified flashcards.
Explore the
Knowledge Genome
of subjects:
Entrance Exams
Professional Certifications
Foreign Languages
Medical & Nursing
Science
English
Humanities & Social Studies
Mathematics
Law
Vocations
Health & Fitness
Business & Finance
Technology & Engineering
Food & Beverage
Fine Arts
Random Knowledge
Make Flashcards
How It Works
Features Overview
The Science of Studying
Educators
Schools & Teachers
Tutors & Resellers
Businesses
Employee Training
Publishers & Resellers
Academy
Academy Homepage
The Science of Studying
Study Tips
Teaching Tips
Employee Training Tips
Language Learning Tips
Test Prep Tips
Log in
My Dashboard
Get Started
Log out
CompTIA Security+ SY0-501 - Based on Objectives
> CompTIA Security+ Acronyms > Flashcards
CompTIA Security+ Acronyms Flashcards
(0 cards)
Study These Flashcards
CompTIA Security+ SY0-501 - Based on Objectives
flashcards
Decks in class (45)
# Cards
1.0 Threats, Attacks and Vulnerabilities (21%)
0
1.1 Given a scenario, analyze indicators of compromise and determine the type of malware.
13
1.2 Compare and contrast types of attacks.
61
1.3 Explain threat actor types and attributes.
11
1.4 Explain penetration testing concepts.
10
1.5 Explain vulnerability scanning concepts.
7
1.6 Explain the impact associated with types of vulnerabilities.
22
2.0 Technologies and Tools (22%)
0
2.1 Install and configure network components, both hardware and software-based, to support organizational security.
76
2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization.
25
2.3 Given a scenario, troubleshoot common security issues.
22
2.4 Given a scenario, analyze and interpret output from security technologies.
12
2.5 Given a scenario, deploy mobile devices securely.
45
2.6 Given a scenario, implement secure protocols
22
3.0 Architecture and Design (15%)
0
3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides.
18
3.2 Given a scenario, implement secure network architecture concepts.
31
3.3 Given a scenario, implement secure systems design.
31
3.4 Explain the importance of secure staging deployment concepts.
8
3.5 Explain the security implications of embedded systems.
10
3.6 Summarize secure application development and deployment concepts.
30
3.7 Summarize cloud and virtualization concepts.
19
3.8 Explain how resiliency and automation strategies reduce risk.
21
3.9 Explain the importance of physical security controls.
27
4.0 Identity and Access Management (16%)
0
4.1 Compare and contrast identity and access management concepts
10
4.2 Given a scenario, install and configure identity and access services.
13
4.3 Given a scenario, implement identity and access management controls.
29
4.4 Given a scenario, differentiate common account management practices.
28
5.0 Risk Management (14%)
0
5.1 Explain the importance of policies, plans and procedures related to organizational security.
28
5.2 Summarize business impact analysis concepts.
14
5.3 Explain risk management processes and concepts.
25
5.4 Given a scenario, follow incident response procedures.
13
5.5 Summarize basic concepts of forensics
16
5.6 Explain disaster recovery and continuity of operations concepts.
23
5.7 Compare and contrast various types of controls
9
5.8 Given a scenario, carry out data security and privacy practices
21
6.0 Cryptography and PKI (12%)
0
6.1 Compare and contrast basic concepts of cryptography.
39
6.2 Explain cryptography algorithms and their basic characteristics
33
6.3 Given a scenario, install and configure wireless security settings
17
6.4 Given a scenario, implement public key infrastructure.
43
CompTIA Security+ Acronyms
0
Security+ Proposed Hardware and Software List
5