Brainscape
Find Flashcards
Discover millions of Flashcards
Browse Brainscape-Certified Flashcards
Learn faster with our catalog of expert certified, pre-made flashcards.
Browse All Flashcards
Browse our full catalog of user-generated and Brainscape-Certified flashcards.
Explore the
Knowledge Genome
of subjects:
Entrance Exams
Professional Certifications
Foreign Languages
Medical & Nursing
Science
English
Humanities & Social Studies
Mathematics
Law
Vocations
Health & Fitness
Business & Finance
Technology & Engineering
Food & Beverage
Fine Arts
Random Knowledge
Make Flashcards
How It Works
Features Overview
The Science of Studying
Educators
Schools & Teachers
Tutors & Resellers
Businesses
Employee Training
Publishers & Resellers
Academy
Academy Homepage
The Science of Studying
Study Tips
Teaching Tips
Employee Training Tips
Language Learning Tips
Test Prep Tips
Log in
My Dashboard
Get Started
Log out
Security Plus 701
> Exam Note > Flashcards
Exam Note Flashcards
Misc topics from Comptia Study Book
(1 cards)
Study These Flashcards
1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
Security Plus 701
flashcards
Decks in class (30)
# Cards
Exam Note
1
1.1 Compare and contrast various types of security controls
10
1.2 Summarize fundamental security concepts
0
1.3 Explain the importance of change management processes and the impact to security
0
1.4 Explain the importance of using appropriate cryptographic solutions
0
2.1 Compare and contrast common threat actors and motivations
0
2.2 Explain common threat vectors and attack surfaces
0
2.3 Explain various types of vulnerabilities
0
2,4 Given a scenario, analyze indicators of malicious activity
0
2.5 Explain the purpose of mitigation techniques used to secure the enterprise
0
3.1 Compare and contrast security implications of different architecture models
0
3.2 Given a scenario, apply security principles to secure enterprise infrastrucre
0
3.3 Compare and contrast concepts and strategies to protect data
0
3.4 Explain the importance of resilience and recovery in security architecture
0
4.1 Given a scenario, apply common security techniques to computing resources
0
4.2 Explain the security implications of proper hardware, software, and data asset management
29
4.3 Explain various activities associated with vulnerability management
0
4.4 Explain security alerting and monitoring concepts and tools
0
Given a scenario, modify enterprise capabilities to enhance security
0
4.6 Given a scenario, implement and maintain identity and access management
0
4.7 Explain the importance of automation and orchestration related to secure operations
0
4.8 Explain appropriate incident response activities
0
4.9 Given a scenario, use data sources to support an investigation
1
5.1 Summarize elements of effective security governance
0
5.2 Explain elements of the risk management process
0
5.3 Explain the processes associated with third-party risk assessment and management
0
Summarize elements of effective security compliance
0
5.5 Explain types and purposes of audits and assessments
0
5.6 Given a scenario, implement security awareness practices
0
Ports And Protocols
29