Brainscape
Find Flashcards
Discover millions of Flashcards
Browse Brainscape-Certified Flashcards
Learn faster with our catalog of expert certified, pre-made flashcards.
Browse All Flashcards
Browse our full catalog of user-generated and Brainscape-Certified flashcards.
Explore the
Knowledge Genome
of subjects:
Entrance Exams
Professional Certifications
Foreign Languages
Medical & Nursing
Science
English
Humanities & Social Studies
Mathematics
Law
Vocations
Health & Fitness
Business & Finance
Technology & Engineering
Food & Beverage
Fine Arts
Random Knowledge
Make Flashcards
How It Works
Features Overview
The Science of Studying
Educators
Schools & Teachers
Tutors & Resellers
Businesses
Employee Training
Publishers & Resellers
Academy
Academy Homepage
The Science of Studying
Study Tips
Teaching Tips
Employee Training Tips
Language Learning Tips
Test Prep Tips
Log in
My Dashboard
Get Started
Log out
CompTIA Security+
> SECURITY TECHNIQUES > Flashcards
SECURITY TECHNIQUES Flashcards
(1 cards)
Study These Flashcards
1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
CompTIA Security+
flashcards
Decks in class (211)
# Cards
Threat Actor Motivations
12
Hacktivists
7
Organized Crime
2
Unskilled Attackers
3
Nation-State Actor
5
Insider Threats
3
Shadow IT
3
Threat Vectors and Attack Surfaces
11
Outsmarting Threat Actors
11
PHYSICAL SECURITY
1
Fencing and Bollards
4
Attacking with Brute Force
5
Surveillance Systems
3
Bypassing Surveillance Systems
7
Access Control Vestibules
5
Door Locks
4
Access Badge Cloning
7
SOCIAL ENGINEERING
1
Motivational Triggers
7
Impersonation
5
Pretexting
2
Phishing Attacks
6
Preventing Phishing Attacks
7
Frauds and Scams
5
Influence Campaigns
3
Other Social Engineering Attacks
13
MALWARE
3
Viruses
11
Worms
3
Trojans
3
Ransomware
3
Zombies and Botnets
7
Rootkits
12
Backdoors and Logic Bombs
4
Keylogger
3
Spyware and Bloatware
6
Malware Attack Techniques
12
Indications of Malware Attacks
9
DATA PROTECTION
1
Data Classifications
14
Data Ownership
9
Data States
17
Data Types
5
Data Sovereignty
2
Securing Data
8
Data Loss Prevention (DLP)
5
CRYPTOGRAPHIC SOLUTIONS
8
Symmetric vs Asymmetric
5
Symmetric Algorithms
10
Asymmetric Algorithms
4
Hashing
8
Pass the Hash Attack
5
RISK MANAGEMENT
1
Risk Assessment Frequency
6
Risk Identification
7
Risk Register
13
Qualitative Risk Analysis
1
Quantitative Risk Analysis
6
Risk Management Strategies
7
Risk Monitoring and Reporting
9
THIRD-PARTY VENDOR RISKS
1
Supply Chain Risks
5
Supply Chain Attacks
8
Vendor Assessment
10
Vendor Selection and Monitoring
5
Contracts and Agreements
8
GOVERNANCE AND COMPLIANCE
2
Governance
10
Governance Structures
6
Policies
7
Standards
5
Procedures
5
Governance Considerations
7
Compliance
12
Non-compliance Consequences
5
ASSET AND CHANGE MANAGEMENT
2
Acquisition and Procurement
5
Mobile Asset Deployments
3
Asset Management
6
Asset Disposal and Decommissioning
12
Change Management
5
Change Management Processes
6
Technical Implications of Changes
6
Documenting Changes
2
AUDITS AND ASSESSMENTS
5
Internal Audits and Assessments
10
Performing an Internal Assessment
3
External Audits and Assessments
5
Penetration Testing
5
Reconnaissance in Pentesting
6
Attestation of Findings
6
CYBER RESILIENCE AND REDUNDANCY
2
High Availability
10
Data Redundancy
9
Capacity Planning
5
Powering Data Centers
9
Data Backups
10
Continuity of Operations Plan
3
Redundant SIte Considerations
10
Resilience and Recovery Testing
8
SECURITY ARCHITECTURE
3
On-Premise Vs the Cloud
9
Cloud Security
11
Virtualization and Containerization
8
Serverless
8
Microservices
9
Network Infrastructure
3
Software-defined Network (SDN)
4
Infrastructure as Code (IaC)
2
Centralized vs. Decentralized Architectures
2
Internet of Things (IoT)
2
ICS and SCADA
4
Embedded Systems
8
SECURITY INFRASTRUCTURE
1
Ports and Protocols
7
Firewalls
16
Configuring Firewalls
5
IDS and IPS
9
Network Appliances
5
Port Security
9
Securing Network Communications
16
Infrastructure Considerations
9
Selecting Infrastructure Controls
6
IDENTITY AND ACCESS MANAGEMENT (IAM) SOLUTIONS
1
Identity and Access Management (IAM)
9
Multi-factor Authentication
2
Password Security
6
Password Attacks
5
Single Sign-On (SSO)
4
Federation
1
Privileged Access Management (PAM)
4
Access Control Models
7
Assigning Permissions
1
VULNERABILITIES AND ATTACKS
2
Hardware Vulnerabilities
13
Bluetooth Vulnerabilities and Attacks
9
Mobile Vulnerabilities and Attacks
5
Zero-day Vulnerabilities
3
Operating System Vulnerabilities
5
SQL and XML Injections
6
XSS and XSRF
10
Buffer Overflow
5
Race Conditions
8
MALICIOUS ACTIVITY
1
Distributed Denial of Service
8
Domain Name System (DNS) Attacks
6
Directory Traversal Attack
5
Execution and Escalation Attacks
10
Replay Attacks
2
Session Hijacking
7
On-path Attacks
9
Injection Attacks
4
Indicators of Compromise (IoC)
10
HARDENING
1
Restricting Applications
4
Trusted Operating Systems
5
Updates and Patches
5
Patch Management
5
Group Policies
3
SELinux
15
Data Encryption Levels
7
Secure Baselines
1
SECURITY TECHNIQUES
1
Wireless Infrastructure
5
Wireless Security Settings
10
Application Security
10
Network Access Control (NAC)
3
Web and DNS Filtering
8
Email Security
8
Endpoint Detection and Response
3
User Behavior Analytics
2
Selecting Secure Protocols
5
VULNERABILITY MANAGEMENT
1
Identifying Vulnerabilities
8
Threat Intellegence Feeds
4
Responsible Disclosure Programs
2
Analyzing Vulnerabilities
9
Vulnerability Response and Remediation
7
Validating Vulnerability Remediation
1
Vulnerability Reporting
4
ALERTING AND MONITORING
3
Monitoring Resources
3
Alerting and Monitoring Activities
8
Simple Network Management Protocol (SNMP)
5
Security Information and Event Management (SIEM)
3
Data from Security Tools
4
Security Content Automation Protocol (SCAP)
8
Network and Flow Analysis
6
Single Pane of Glass
5
INCIDENT RESPONSE
1
Incident Response Process
10
Threat Hunting
3
Root Cause Analysis
6
Incident Response Training and Testing
5
Digital Forensic Procedure
12
Data Collection Procedures
1
INVESTIGATING AN INCIDENT
0
Investigative Data
9
Dashboards
3
Automated Reports
4
Vulnerability Scans
2
Packet Captures
1
Metadata
2
AUTOMATION AND ORCHESTRATION
5
When to Automate and Orchestrate
2
Automating Support Tickets
3
Automating Onboarding
3
Automating Security
3
Automating Application Development
10
Integrations and APIs
5
Ports
6