This class was created by Brainscape user Tánh Phạm. Visit their profile to learn more about the creator.

Decks in this class (48)

Ch19 - Understanding Monitoring and Auditing
Auditing,
Logging
2  cards
Ch18 - 18.02 - Performing a Security Assessment
Open vulnerability and assessment...,
Operationally critical threat ass...,
Open web application security pro...
33  cards
Ch18 - 18.01 - Understanding Types of Assessments
Risk assessment analysis,
Threat assessment,
Configuration assessment
17  cards
Ch17 - 17.03 - Looking at Incident Response
Computer incident response team o...,
Incident response plan,
Incident response process
18  cards
Ch17 - 17.02 - Collecting Digital Evidence
Understanding the process of coll...,
1 seize the evidence,
2 acquire the evidence data acqui...
9  cards
Ch17 - 17.01 - Working with Evidence
Chapter 17 - Introduction to Computer Forensics and Incident Response
9  cards
Ch16 - 16.04 - Understanidng High Availability
High availability,
Failover clustering,
Network load balancing
3  cards
Ch16 - 16.03 - Implementing Fault Tolerance
Redundant array of independent di...,
Raid 0 disk striping performance,
Raid 1 disk mirroring
5  cards
Ch16 - 16.02 - Backing Up and Restoring Data (Back Up Concepts)
Full backup,
Incremental backup,
Differential backup
4  cards
Ch16 - 16.01 - Intro to Disaster Recovery and Business Continuity
Business continuity plan bcp,
Steps to creating a bcp,
Bcp 1 project initiation p1
37  cards
Ch15 - 15.03 - Risk Mitigation Strategies
Risk mitigation strategies,
1 mitigate the risk mitigation,
2 accept the risk acceptance
6  cards
Ch15 - 15.02 - Types of Risk Analysis
Qualitative analysis,
Quantitative analysis,
Quan analysis exposure factor ef
5  cards
Ch15 - 15.01 - Intro to Risk Analysis
Asset,
Vulnerability,
Threat
22  cards
Ch14 - Physical Security
Facility concerns,
Motion sensors,
Closed circuit sensor
18  cards
Ch13 - 13.02 - Managing a Public Key Infrastructure
Certificate life cycle,
Certificate life cycle 1 request,
Certificate life cycle 2 certificate
11  cards
Ch13 - 13.01 - Introduction to Public Key Infrastructure
Review ch12 key points,
Certificates,
Certificates subject attribute
24  cards
Ch12 - 12.05 - Identifying Encryption Uses
Ephemeral key,
Perfect forward secrecy,
Key stretching
9  cards
Ch12 - 12.04 - Understanding Hashing
Hashing algorithms,
Message digest md,
Secure hash algorithm sha
8  cards
Ch12 - 12.03 - Asymmetric Encryption
Asymmetric encryption,
Pros n cons of asymmetric encryption,
Asymmetric encryption algorithms
8  cards
Ch12 - 12.02 - Symmetric Encryption
Symmetric encryption,
Symmetric encryption has many oth...,
Pros n cons of symmetric algo
11  cards
Ch12 - 12.01 - Intro to Cryptography Services
Encryption,
Substitution ciphers,
Transposition ciphers
18  cards
Ch11 - 11.03 Implementing Access Control
User account types,
Common rights in windows,
Right vs permission
5  cards
Ch11 - 11.02 - Access Control Models
Discretionary access control dac,
Mandatory access control mac,
Common sensitivity levels for gov...
9  cards
Ch11 - 11.01 - Introducing Access Control
Ch11 - Access Control
14  cards
Ch10 - Authentication
Authentication factors,
Authentication factors something ...,
Authentication factors something ...
37  cards
Ch9 - 9.03 - Configuring Wireless Network & & 9.04 - Other Wireless Technologies
Fat wireless access point,
Thin wireless access point,
Other popular wireless standards ...
6  cards
Ch9 - 9.02 - Securing a Wireless Network
Captive portal,
Securing a wireless network,
Data emanation
8  cards
Ch9 - 9.01 - Understanding Wireless Networking
Ch9: Wireless Networking and Security
12  cards
Ch8 - 8.03 - Network Design and Administration Principles
Physical segmentation multiple co...,
Physical segmentation multiple br...,
Virtual lans
19  cards
Ch8 - 8.02 - Using Intrusion Detection Systems
Intrusion detection system ids,
Different methods that an ids use...,
Signature based systems
13  cards
Ch8 - 8.01 - Understanding Firewalls & Proxy Servers
Ch8 - Securing the Network Infrastructure
28  cards
Ch7 - Implementing System Security
Host based firewalls personal fir...,
Tcp wrappers,
Host based intrusion detection sy...
36  cards
Ch6 - Mitigating Security Threats
Operating system hardening,
Security hot fix,
Patch
26  cards
Ch5 - System Security Threats
Types of privilege escalation,
Rootkits types of rootkits,
Polymorphic malware
7  cards
Ch4 - 4.04 - Understanding Application Attacks
Cross site scripting xss,
Cross site request forgery csrf
2  cards
Ch4 - 4.03 - Looking at Password Attacks
Dictionary attack,
Brute force attack,
Hybrid attack
7  cards
Ch4 - 4.02 - Identifying Network Attacks
Denial of service dos,
Distributed denial of service ddos,
Ddos smurf attack
16  cards
Ch4 - 4.01 - Understanding Social Engineering
Popular social engineering attacks,
Social engineering reasons for ef...
2  cards
Ch3 - 3.02 - General Security Policies
Acceptable use policy,
Password policy,
Nondisclosure agreement nda
5  cards
Ch3 - 3.01 - Intro to Security Policies
Security policy,
Structure of a policy,
Types of policies
3  cards
Ch2 - 2.04 - Looking at Security Roles
System owner and data owner,
System administrator,
Other roles
4  cards
Ch2 - 2.03 - Understanding Security Principles & Terminologies
List types of security,
List some important security prin...,
List some important security prin...
9  cards
Ch2 - 2.02 - Understanding Authentication and Authorization
List popular methods used for ide...,
Identification and authentication,
Authorization
3  cards
Ch2 - 2.01 - Goals of Information Security
Confidentiality,
Integrity,
Availability
6  cards
Ch1 - 1.03 - Network Security Best Practices
Network security best practices d...,
Network security best practices p...,
Network security best practices c...
3  cards
Ch1 - 1.02 - Understanding TCP/IP
Loopback address,
Private address,
Transmission control protocol tcp
19  cards
Ch1 - 1.01 - Network Cabling
Coaxial cable,
Twisted pair cable,
Fiber optic cable
3  cards
Ch1 - 1.01 - Network Device
Hub,
Switch,
Naming switchs common features
14  cards

More about
CompTIA Security+ SY0-501 by Glen E. Clarke

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Tánh Phạm's CompTIA Security+ SY0-501 by Glen E. Clarke flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security+ Practice Tests: Exa...
  • 30 decks
  • 924 flashcards
  • 365 learners
Decks: Threats Attacks And Vulnerabilities 1, Threats Attacks And Vulnerabilities 2, Threats Attacks And Vulnerabilities 3, And more!
Make Flashcards