This class was created by Brainscape user Ernesto Gastelum.

By:

Decks in this class (22)

1.1 Threat Management
What is a public cloud 1,
What does os fingerprinting invol...,
What are the three main protocols...
31  cards
1.2 Threat Management
What is the lightweight extensibl...,
Which type of analysis involves i...,
Which wireless protocol provides ...
22  cards
1.3 Threat Management
What is the most secure implement...,
What is the name for a hole in th...,
Which malicious software infects ...
57  cards
1.4 Threat Management
According to the cysa objectives ...,
Is a dhcp server normally placed ...,
What is meant by the term exploit...
24  cards
2.1 Vulnerability Management
What should you consult to identi...,
What is a flaw loophole or weakne...,
Which scan has less of an impact ...
38  cards
2.2 Vulnerability Management
What are the three possible value...,
Which value of the authentication...,
Which cvss metric describes the a...
33  cards
2.3 Vulnerability Management
In which type of attack is a user...,
What is meant by vm escape 2,
Which type of system does a stuxn...
56  cards
3.1 Cyber Incident Response
What does the acronym mtd denote 1,
What is mtbf 2,
What are the four types of person...
18  cards
3.2 Cyber Incident Response
What is the best method to preser...,
What is the order of volatility f...,
What are the four documents forms...
19  cards
3.3 Cyber Incident Response
Which stakeholder in the incident...,
Which stakeholder in the incident...,
What are the four main stakeholde...
8  cards
3.4 Cyber Incident Response
What is data exfiltration 1,
What should you do if you discove...,
What happens in vertical privileg...
11  cards
3.5 Cyber Incident Response
What is the best way to determine...,
Why should a first responder be f...,
Which eradication technique reins...
17  cards
4.1 Security Architecture and Tool Sets
Which audit category will audit a...,
What is another term for logical ...,
Which type of controls dictates h...
36  cards
4.2 Security Architecture and Tool Sets
What is the top most level of the...,
What is the primary function of l...,
What are flood guards 3
45  cards
4.3 Security Architecture and Tool Sets
What are the two types of ciphers 1,
What is most commonly used to pro...,
Which key is used to decrypt a di...
18  cards
4.4 Security Architecture and Tool Sets
What is the purpose of filters on...,
What is the purpose of sandbox in...,
Which error condition arises beca...
31  cards
4.5 Security Architecture and Tool Sets
What are the five monitoring tool...,
What is wireshark 2,
What are the three ips tools 3
38  cards
1.0 Threat Management
What is a public cloud 1,
What does os fingerprinting invol...,
What are the three main protocols...
134  cards
2.0 Vulnerability Management
What should you consult to identi...,
What is a flaw loophole or weakne...,
Which scan has less of an impact ...
127  cards
3.0 Cyber Incident Response
What does the acronym mtd denote 1,
What is mtbf 2,
What are the four types of person...
73  cards
4.0 Security Architecture and Tool Sets
Which audit category will audit a...,
What is another term for logical ...,
Which type of controls dictates h...
168  cards
ALL
What is lightweight extensible au...,
Which type of analysis involves i...,
Which wireless protocol provides ...
502  cards

More about
CompTIA CySA+

  • Full test name Unspecified
  • Test acronym Unspecified

The creator of this class did not yet add a description for what is included in this class.

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA A+
  • 7 decks
  • 626 flashcards
  • 428 learners
Decks: 10 Mobile Devices, 20 Networking, 30 Hardware, And more!
Comptia CYSA+
  • 37 decks
  • 1033 flashcards
  • 126 learners
Decks: Threat Intelligence Sharing, Classifying Threats, Network Forensics, And more!
CompTIA A+
  • 28 decks
  • 3865 flashcards
  • 931 learners
Decks: Chapter 1 Mobile Devices Mc, Chapter 1 Mobile Devices, Chapter 1 Mobile Devices Key Terms, And more!
Comp TIA Chapter Reviews
  • 28 decks
  • 758 flashcards
  • 22 learners
Decks: Chapter 2 Review Operational Procedures, Chapter 3 Review The Visible Computer, Chapter 4 Review Microprocessors, And more!