CompTIA Security+ (SY0-701)

This class was created by Brainscape user John Vargas. Visit their profile to learn more about the creator.

Decks in this class (122)

General Security Concepts: Examine Security Controls Category
What are security controls,
What are the security control groups,
What is in the technical control ...
5  cards
General Security Concepts: Examine Security Control Types
What are the 7 security control t...,
What is the function of a prevent...,
What is the function of a prevent...
14  cards
General Security Concepts: Examine the Principle of Security
What is the security triangle,
What is the goal of confidentiality,
What is the goal of integrity
12  cards
General Security Concepts: Examine Authentication Factors
What is the authentication factor,
What are the characteristics of s...,
What are the characteristics of s...
6  cards
General Security Concepts: Examine Authorization and Access control modules
What is authorization,
What is the common access control...,
What is the common access control...
5  cards
General Security Concepts: Examining Authentication, Authorization and Accounting
What does radius do,
What is radius commonly used for,
What is the port used for radius
8  cards
General Security Concepts: Examining The Principle of Zero Trust
What is the zero trust model,
What are the two types of data flow,
What is the control plane
6  cards
General Security Concepts: Examining Physical Security
What is physical security in it,
Why is bollards used,
Why do we use access control vest...
10  cards
General Security Concepts: Examining deception and disruption technology
What are deception and disruption...,
What is a honeypot,
What is honeynet
5  cards
General Security Concepts: Business Processes and Security Operations
Sometimes an organization s busin...,
What are the stake holders,
How can stake holders affect the ...
10  cards
General Security Concepts: Change Management Implications & Documentations
Why is change management so impor...,
What are the positive and negativ...,
What are the positive and negativ...
9  cards
General Security Concepts: Examining Encryption Solutions
What is encrytion,
What are different types of encry...,
What are the different levelsof e...
14  cards
General Security Concepts: Examining Public Key Infrastructure
What is a pki,
What component is the root offlin...,
What component is the subordinate...
11  cards
General Security Concepts: Examining Digital certificates
What are digital certificates,
What are digital signatures,
What are x509 certificates
12  cards
General Security Concepts: Examining Asymmetric Encryption
What is asymmetric encryption,
Asymmetric encryption type rsa,
Asymmetric encryption type dsa
9  cards
General Security Concepts: Examining Symmetric Encryption
What is symmetric encryption,
What,
What examples of symmetric encryp...
12  cards
General Security Concepts: Examining Hashing and Obfuscation
What is hashing and how does it a...,
What are the variety of hashing a...,
What does md5 do
19  cards
General Security Concepts: Quiz Revision
Which of the following are accomp...,
What are the authorization models,
Which technique can tip off an in...
97  cards
Threat, Vulnerabilities and Mitigations: Threat Actors
What are unskilled attackers,
What are the types of malicious a...,
What are nation states attackers
14  cards
Threat, Vulnerabilities and Mitigations: Social Engineer
What is phishing,
What is smishing,
What is im
8  cards
Threat, Vulnerabilities and Mitigations: Business Email Compromise
What is a bec attack,
What is the common bec attack tha...,
How can you exploit a company ceo...
7  cards
Threat, Vulnerabilities and Mitigations: Digital System Threats
What are the three methods you ne...,
What are the vulnerability consid...,
What happens to a system when you...
4  cards
Threat, Vulnerabilities and Mitigations: Network Based Threats
What are the common network based...,
What threats are involved in wire...,
What threats are involved wireles...
5  cards
Threat, Vulnerabilities and Mitigations: Removable Media Threats
What is one of the vulnerabilitie...,
What are the threats of unauthori...,
What are the threats of rubber du...
5  cards
Threat, Vulnerabilities and Mitigations: Supply Chain Attack
What is a supply chain attack
1  cards
Threat, Vulnerabilities and Mitigations: Application Vulnerabilities
What are some of the flaws and we...,
What is memory injection,
How are dll used in a memory inje...
5  cards
Threat, Vulnerabilities and Mitigations: Operating System Vulnerabilities
What are some of the operating sy...,
Apart from the main os used are o...,
What are some of the notable expl...
5  cards
Threat, Vulnerabilities and Mitigations: Web-Based Vulnerabilities
What site can we check to see the...,
What other web application threat...,
What is
6  cards
Threat, Vulnerabilities and Mitigations: Hardware Vulnerabilities
What are the common console and d...,
What is jtag used for,
What is uart used for
10  cards
Threat, Vulnerabilities and Mitigations: Cloud Vulnerabilities
What are the cloud storage threats,
What are the other issues
2  cards
Threat, Vulnerabilities and Mitigations: Virtualization Vulnerabilities
What s a vm escape,
What must the attacker must first...,
What are the alternative ways to ...
4  cards
Threat, Vulnerabilities and Mitigations: Cryptographic Vulnerabilities
What are the three cryptographic ...,
What is a downgrade attack,
What is collision
4  cards
Threat, Vulnerabilities and Mitigations: Mobile Device Vulnerabilities
What threats do mobile devices face,
What are the weaknesses,
W
7  cards
Threat, Vulnerabilities and Mitigations: Zero Day Vulnerabilities
What is zero day vulnerabilities
1  cards
Threat, Vulnerabilities and Mitigations: Indicators of Malware Attacks
What are malware attacks,
What signs do you need to look ou...,
What are some indicators of poor ...
10  cards
Threat, Vulnerabilities and Mitigations: Indicators of Physical Attacks
What are some of the unkown peopl...,
What are some,
What are the devices and peripher...
4  cards
Threat, Vulnerabilities and Mitigations: Indicators of Network Attacks
What are some signs of ddos attacks,
What are signs of dns attacks,
What are signs of wireless attacks
8  cards
Threat, Vulnerabilities and Mitigations: Indicators of Application attack
Injection attack,
Buffer overflow attacks,
Replay attacks
5  cards
Threat, Vulnerabilities and Mitigations: Indicators of Cryptographic Attacks
What are the signs of a downgrade...,
What are the signs of collision a...,
Indicators of compromise attack
3  cards
Threat, Vulnerabilities and Mitigations: Indicators of Password Attacks
What are indications of password ...,
What is a dictionary attack,
What is a brute force attack
5  cards
Threat, Vulnerabilities and Mitigations: Cybersecurity Mitigation Techniques
0  cards
Threat, Vulnerabilities and Mitigations: Quiz Revision
Which of the following network at...,
What is a reflected attack,
What is a on path attack
177  cards
Security Architecture: Cloud-Related Concepts
What is the responsibility matrix,
What are the cloud service models,
What are the shared responsibilities
12  cards
Security Architecture: Network Infrastructure concepts
Why do we have to consider beign ...,
What is air gapped,
What is logical segmentations
6  cards
Security Architecture: Virtualization Concept
What is virtualization,
What are containers,
How can you manage containers
5  cards
Security Architecture: IoT and SCADA
What are iot architectures securi...,
How can we apply security measure...,
What is ics and scada architecture
6  cards
Security Architecture: Architectural Model Considerations
What key strucutre we need to loo...,
What key strucutre we need to loo...,
What key components we need to lo...
12  cards
Security Architecture: Security Infrastructure Considerations
What are the key factors when des...,
What do you need to consider in a...,
What do you need to consider in a...
6  cards
Security Architecture: Network Appliances
List all the network appliances t...,
What is a jump server,
What is a proxy server
6  cards
Security Architecture: Port Security
Why do we need port security,
What are the two elements when it...,
What is ieee 8021x
4  cards
Security Architecture: Firewalls
What are firewalls,
What is l4 l7,
What are wafs
5  cards
Security Architecture: Secure Communication and Access
Whare the 5 key elements of secur...,
What s vpn,
What s tls
6  cards
Security Architecture: Selecting Effective Controls
What are the three key elements o...,
What are administrative controls,
What are technical controls
4  cards
Security Architecture: Data Types
What are the 6 key elements of da...,
What is regular data type,
What is trade secret data type
7  cards
Security Architecture: Data Classification
What are the potential data class...,
What are the deemed as the us gov...,
What is public
8  cards
Security Architecture: Data Considerations
What are the three types of data ...,
What is data sovereignty,
What is geolocation
6  cards
Security Architecture: Methods of Securing Data
What is geographical restrictions,
Encryption,
Hashing
8  cards
Security Architecture: HA and Site Considerations
How can you ensure high availability,
What are the key factors in load ...,
What are the key factors of clust...
7  cards
Security Architecture: Platform Diversity and Multi-Cloud Systems
What is platform diversity,
Why is it beneficial for platform...,
What are the advantages if multi ...
6  cards
Security Architecture: Continuity of Operations and Capacity Planning
What is business continuity,
What could go wrong,
What are the main considerations
9  cards
Security Architecture: Testing
What are some technique used for ...,
What are some table top excercises,
What are some of the consideratio...
5  cards
Security Architecture: Backups
Onsite and offsite,
Frequency,
Encryption
8  cards
Security Architecture: Power
What are two thing you can consid...,
What are the key factors of using...,
Ups system key factors
3  cards
Security Architecture: Quiz Revision
Order the six phases of the softw...,
In security architecture testing ...,
What is vulnerability testing
144  cards
Security Operations: Examining Baselines
What are the common methods for u...,
How are baseline set,
What are some categories we need ...
13  cards
Security Operations: Examining security for mobile devices
What involves in managing mobile ...,
What are some of the deployment m...,
List the basic security technique...
9  cards
Security Operations: Examining Wireless Security
Common wireless security settings,
What are the three important wire...,
What are the cryptographic protoc...
6  cards
Security Operations: Examining Application Security
What is input validation,
What are the two types of input v...,
What are the application security...
7  cards
Security Operations: Examining Asset Management
What are the benefits of asset ma...,
What are the processes of obtaini...,
What are two key factors of asset...
11  cards
Security Operations: Identifying Vulnerabilities
What are the three main methods f...,
What is sast,
What is dast
12  cards
Security Operations: Examining Vulnerability Analysis
What are false positives and nega...,
What is cve,
What is cvss
4  cards
Security Operations: Vulnerability response, Remediation and Reporting
Why is response so important,
What are some of the strategies y...,
Why is validation important
6  cards
Security Operations: Examining Security monitoring and alerting
What are the three categories tha...,
What options can you used for mon...,
Why do we use performance metrics
17  cards
Security Operations: Examining Firewalls and intrusion detection devices
Why are firewalls so important,
Firewall rules are stored in,
What is the concept of the firewa...
5  cards
Security Operations Examining Web Filtering
What is web filtering,
What types of web filtering is th...,
What is a centralized proxy
9  cards
Security Operations: Examine Email Security
What are the types of email secur...,
What is s mime,
What is digital signature
6  cards
Security Operations: Examining Endpoint Detection
What are considered as endpoint,
What is edr,
What activities can edr detect
4  cards
Security Operations: Examining Secure network protection
How does the tcp 3 way handshake ...,
How does the tls handshake work,
Secure file server protocols
4  cards
Security Operations: Examining Operating Systems
What is os security,
What techniques should you implem...,
What is centralized administration
7  cards
Security Operations: Examining Password Security
How can you edit password complex...,
What is the best way to avoid pas...,
How can you keep up to daye
6  cards
Security Operations: Examining Single Sign-On
What is sso,
Benefits of sso,
What is identity federation
10  cards
Security Operations: Examining user onboarding and Offboarding
What is onboarding and offboarding,
What is provisioning and deprovis...,
What is the process of onboarding...
5  cards
Security Operations: Examining Identity and Access management
What is the identity part of iam,
What is the access part of iam,
Can identity and access work toge...
4  cards
Security Operations: Examining Privileged Identity Management
0  cards
Security Operations: Examining automation and scripting uses
What is automation,
What cases you would use automation,
How are automation continuous int...
6  cards
Security Operations: Examining the incident response process and activities
What is the incident response pro...,
What involves in preperation,
What involves detections
9  cards
Security Operations: Examine Digital-forensics Activities
What are the components of the di...,
What is legal hold,
What is chain of custody
7  cards
Security Operations: Examining investigations data sources and log data
What are the data sources that su...,
How do logs support investigations,
What are involved in dashboards
13  cards
Security Operations - Quiz Revision
Which of the following data sourc...,
What are automated reports,
Ips ids logs
164  cards
Security Management Programs and Oversight: Guide Line and Policies
What are guideline and policies,
What are aup s,
What are isp s
7  cards
Security Management Programs and Oversight: Standard and Procedures
What are standards,
What are procedures
2  cards
Security Programs and Oversight: External Considerations and Revisions
What should you do to keep up wit...,
How should you maintain these con...
2  cards
Security Programs Management and Oversight: Governance Strucutres
Why are board memebers so importa...,
What are committees,
What are government entities
4  cards
Security Management Programs and Oversight: Roles and Responsibilities
What is the role of the owner,
What is the role of the owner,
What is the role of a processor
5  cards
Security Management Programs and Oversight: Risk Identification and Risk Assessment
What is the process of risk ident...,
What is risk assessment criteria
2  cards
Security Management Programs and Oversight: Risk Analysis
What type of analysis you can use...,
What is sle,
What is ale
8  cards
Security Management Programs and Oversight: Risk Register, Tolerance and Appetite
What is a risk register,
What is involved in risk tolerance,
What is risk appetite
6  cards
Security Management Programs and Oversight: Risk Management Strategies
There are several common methods ...
1  cards
Security Management Program and Oversight: Risk Reporting and BIA
What is risk reporting and bia,
What is rto,
What is rpo
5  cards
Security Management Programs and Oversight: Vendor Assessment and selection
What is third party assessment,
What is pen testing,
What is right to audit clause
7  cards
Security Management Programs and Oversight: Agreement Types
Sla,
Moa,
Mou
8  cards
Security Management Programs and Oversight: Additional Vendor Considerations
How can we ensure we have a good ...,
Why are questionnaires so crucial...,
We do we need to establish a rule...
3  cards
Security Management Programs and Oversight: Compliance
What is internal compliance,
What is external compliance,
Consequences of noncompliance fines
7  cards
Security Management Programs and Oversight: Compliance Monitoring
What is due diligence,
What is attestation and acknowled...,
What is internal and external
4  cards
Security Management Programs and Oversight: Privacy Consideration
Legal compliance,
Data subject compliance,
Control vs processes
6  cards
Security Management Programs and Oversight: Attestation
What is attestation,
What are the key points of attest...,
What are the key points of attest...
10  cards
Security Management Programs and Oversight: Audits
Internal audits,
External audits
2  cards
Security Management Programs and Oversight: Pen Testing
What is penetration testing,
Physical,
Offensive
6  cards
Security Management Programs and Oversight: Phishing
What is phising,
Organizational phishing campaigns,
Phishing signs
3  cards
Security Management Programs and Oversight: Anomalous Behaviour Recognition
What is anomalous behaviour recog...,
What is the primary goal of anoma...,
Anomalous behaviour recognition i...
3  cards
Security Management Programs and Oversight: User Guidance and Training
Why are policy and hand books imp...,
What do you need to consider when...,
Insider threats are important to ...
8  cards
Security Management Programs and Oversight: Reporting and Monitoring
What is reporting and monitoring,
What can monitoring and reporting...
2  cards
Security Management Programs and Oversight: Development and Execution
What task should you implement wh...
1  cards
Security Management Programs and Oversight Quiz
A huge customer data breach occur...,
In a security awareness training ...,
What is defined in an acceptable ...
107  cards
CompTIA Security+ (SY0-701) Practice Exam 1 Revision
Revise Incorrect question
31  cards
CompTIA Security+ (SY0-701) Exam 2 Revision
When deploying a new nids in an e...,
What is the most effective measur...,
A company needs to ensure that on...
18  cards
CompTIA Security+ (SY0-701) Exam 3 Revision
A user notices an advertisement f...,
For hardening a company s mobile ...,
What is a significant security co...
21  cards
CompTIA Security+ (SY0-701) Exam 4
To ensure ongoing compliance with...,
For a company focused on minimizi...,
A security administrator notices ...
19  cards
CompTIA Security+ (SY0-701) Exam 5 Revision
During an online purchase a user ...,
To manage changes in security pro...,
An organization notices an increa...
21  cards
CompTIA Security+ (SY0-701) Exam 6
A company is reviewing their clou...,
A company s proprietary software ...,
A company conducts regular securi...
25  cards
Professor Messer - Security+ SY0-701: Exam A
Revision of wrong questions
22  cards
Professor Messer - Security+ SY0-701: Exam B
What is the first step of the inc...,
What is the second step of the in...,
What is the third step of the inc...
71  cards

More about
CompTIA Security+ (SY0-701)

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study John Vargas's CompTIA Security+ (SY0-701) flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security+ (SY0-701)
  • 30 decks
  • 918 flashcards
  • 170 learners
Decks: Acronym List A D, Acronym E M, Acronym N T, And more!
Security+ (SY0-701)
  • 22 decks
  • 1650 flashcards
  • 256 learners
Decks: Lesson 1 Summarize Fundamental Security, Lesson 2 Compare Threat Types, Lesson 3 Explain Cryptographic Solutions, And more!
Make Flashcards