This class was created by Brainscape user Bob OBrien. Visit their profile to learn more about the creator.

Decks in this class (12)

Section 1: Understanding Security Fundamentals
What are the three components of ...,
Why might an interactive cctv cam...,
What does confidentiality mean
25  cards
Section 2: Implementing Public Key Infrastructure
What type of certificate does a c...,
If you are going to use a ca inte...,
If you want to carry out b2b acti...
59  cards
Section 3: Investigating Identity and Access Management
What is the most common form of a...,
When you purchase a new wireless ...,
What is password history
59  cards
Section 4: Exploring Virtualization and Cloud Concepts
In a cloud environment what is el...,
In which cloud environmetn would ...,
What cloud model would you not be...
41  cards
Section 5: Monitoring, Scanning and Penetration Testing
Which pen tester would be given s...,
Why would a shared account pose a...,
Which pen tester would be given n...
23  cards
Section 6: Understanding Secure and Insecure Protocols
What is the authentication protoc...,
Describe how ipsec tunnel mode works,
Describe how ipsec transport mode...
25  cards
Section 7: Delving into Network and Security Concepts
What is the purpose of a web appl...,
What is implicit deny and which t...,
What is the firewall that does co...
51  cards
Section 8: Securing Wireless and Mobile Solutions
What two groups of people might u...,
What is the difference between fa...,
What is the wap master password a...
27  cards
Section 9: Identifying Threats, Attacks and Vulnerabilities
If you install a freeware program...,
Describe how a fileless virus ope...,
How does an attacker carry out cr...
62  cards
Section 10: Governance, Risk, and Compliance
What is a vulnerability in relati...,
What is the purpose of bpa,
What is a multiparty risk
54  cards
Section 11: Managing Application Security
Name three types of mobile device...,
What is an embedded electronic sy...,
What is the purpose of a scada sy...
33  cards
Section 12: Dealing with Incident Response Procedures
What raid model ha a minimum of t...,
What raid models has a minimum of...,
What is the difference between ra...
30  cards

More about
cyber

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Bob OBrien's Cyber flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Cyber Security (CompTIA Security+)
  • 41 decks
  • 1670 flashcards
  • 5 learners
Decks: Chapter 1 Threats Attacks And Vulnerabil, Chapter 11 Social Engineering, Chapter 12 Attack Types, And more!
Cyber
  • 6 decks
  • 98 flashcards
  • 1 learners
Decks: Basic, Cyberbook, Basic2, And more!
Cyber Security - Cambridge Technical
  • 4 decks
  • 101 flashcards
  • 64 learners
Decks: Lo1, Lo2, L03, And more!
Cyber Revolution
  • 8 decks
  • 1054 flashcards
  • 2 learners
Decks: Mobile Devices And Networks, Hardware, Networking, And more!
Make Flashcards