This class was created by Brainscape user Russell Davis. Visit their profile to learn more about the creator.

Decks in this class (35)

Social Engineering
What is phishing,
What is smishing,
What is vishing
33  cards
Determine type of attack via indicators
What is,
What is,
What is
37  cards
Application Attacks
What is,
What is,
What is
28  cards
Networks Attacks
What is,
What is,
What is
30  cards
Explain different threat actors, vectors, and intelligence sources
What is,
What is,
What is
48  cards
Security concerns related to vulnerabilities
What is,
What is,
What is
30  cards
Techniques employed in security Assessments
What is,
V,
What is
26  cards
Penetration testing techniques
Penetration testing,
Known environment,
Unknown environment
22  cards
Security concepts in enterprise environment
Configuration management,
Diagrams,
Baseline configuration
30  cards
Virtualization and Cloud Computing concepts
Cloud models,
Infrastructure as a service iaas,
Platform as a service paas
26  cards
secure application development, deployment, and automation concepts
Environment,
Development,
Test
31  cards
Summarize authentication and authorization design concepts
Authentication methods,
Directory services,
Federation
31  cards
Given a scenario, implement cybersecurity resilience
Redundancy,
Geographic dispersal,
Disk
37  cards
Explain the security implications of embedded and specialized systems
Embedded systems,
Raspberry pi,
Field programmable gate array fpga
44  cards
Explain the importance of physical security controls
Bollards barricades,
Access control vestibules,
Badges
50  cards
Summarize the basics of cryptographic concepts
Digital signatures,
Key length,
Key length
49  cards
Given a scenario, implement secure protocols
Protocols,
Domain name system security exten...,
Ssh
25  cards
Given a scenario, implement host or application security solutions
Endpoint protection,
Antivirus,
Anti malware
42  cards
Given a scenario, implement secure network designs
Load balancing,
Active active,
Active passive
64  cards
Given a scenario, install and configure wireless security settings
Cryptographic protocols,
Wifi protected access 2 wpa2 wifi...,
Wifi protected access 2 wpa2 wifi...
24  cards
Given a scenario, implement secure mobile solutions
Connection methods and receivers,
Cellular,
Wifi
53  cards
Given a scenario, apply cybersecurity solutions to the cloud
Cloud security controls,
High availability across zones,
Resource policies
30  cards
Given a scenario, implement identity and account management controls
Identity,
Identity provider idp,
Attributes
28  cards
Given a scenario, implement authentication and authorization solutions
Authentication management,
Password keys,
Password vaults
27  cards
Given a scenario, implement public key infrastructure
Public key infrastructure pki,
Key management,
Certificate authority ca
37  cards
Given a scenario, use the appropriate tool to assess organizational security
Network reconnaissance and discovery,
Tracert traceroute,
Nslookup dig
44  cards
Summarize the importance of policies, processes, and procedures for incident response
Incident response plans,
Incident response process,
Preparation
23  cards
Given an incident, utilize appropriate data sources to support an investigation
Vulnerability scan output,
Siem dashboards,
Sensor
32  cards
Given an incident, apply mitigation techniques or controls to secure an environment
Reconfigure endpoint security sol...,
Application approved list,
Application block list deny list
16  cards
Explain the key aspects of digital forensics
Documentation evidence,
Legal hold,
Video
37  cards
Compare and contrast various types of controls
Category,
Managerial,
Operational
11  cards
Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture
Regulations standards and legisla...,
General data protection regulatio...,
National territory or state laws
18  cards
Explain the importance of policies to organizational security
Personnel,
Acceptable use policy,
Job rotation
46  cards
Explain privacy and sensitive data concepts in relation to security
Organizational consequences of pr...,
Reputation damage,
Identity theft
37  cards
Summarize risk management processes and concepts
Risk types,
External,
Internal
48  cards

More about
Comptia

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Russell Davis's Comptia flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA A+
  • 28 decks
  • 3865 flashcards
  • 643 learners
Decks: Chapter 1 Mobile Devices Mc, Chapter 1 Mobile Devices, Chapter 1 Mobile Devices Key Terms, And more!
Comp TIA Chapter Reviews
  • 28 decks
  • 758 flashcards
  • 21 learners
Decks: Chapter 2 Review Operational Procedures, Chapter 3 Review The Visible Computer, Chapter 4 Review Microprocessors, And more!
CompTIA Network+
  • 30 decks
  • 1225 flashcards
  • 1111 learners
Decks: Chapter 1 Sheet1, Chapter 2 Sheet1, Chapter 3 Sheet1, And more!
Make Flashcards