This class was created by Brainscape user Scarlett Millie.

By:

Decks in this class (12)

Cybersecurity and You
What is an example of a secure pa...,
What is the benefit of using two ...,
What is the primary goal of the g...
15  cards
2.1.1 and 1.2.1
Name the group of threat actors i...,
What are the three fundamental pr...,
Hacktivists are primarily driven ...
17  cards
4.6.3, 2.4.14, 4.6.2
What is the recommended approach ...,
Why is password complexity import...,
What is the risk associated with ...
21  cards
2.2.2, 2.2.3, 5.6.2
What is social engineering 1,
Which of the following is a metho...,
What are biases in the context of...
26  cards
2.2.4, 2.2.5, 5.6.2
What is the key difference betwee...,
Which of the following is an exam...,
What is tailgating also known as ...
24  cards
2.4.1, 2.4.2, 2.4.3
What is a trojan horse in the con...,
What is the significance of the t...,
How do trojan horses typically en...
30  cards
2.4.4, 2.4.5, 2.4.6
What are viruses and worms 1,
What distinguishes viruses from w...,
What is a characteristic of worms...
37  cards
2.2.1, 2.4.8, 2.4.9
Which vector exploits vulnerabili...,
What precaution should users take...,
Which vector leverages malicious ...
28  cards
2.3.2, 4.1.3, 2.3.3
What is a buffer overflow vulnera...,
Which type of vulnerability occur...,
What is the primary purpose of a ...
27  cards
1.4.4, 1.4.2, and 1.4.5
What does obfuscation refer to in...,
Which obfuscation technique invol...,
What is the process of replacing ...
29  cards
2.4.13, 1.4.6, 1.4.3
What is the aim of a cryptographi...,
What is a primary benefit of usin...,
Which cryptographic tool protects...
29  cards
POST TEST
A broad category for techniques t...,
Software that is intended to do h...,
Practice of sending fraudulent em...
20  cards

More about
Cyber Security

  • School Unspecified
  • Program type Unspecified
  • Course Unspecified
  • Instructor Unspecified
  • Standards Unspecified

The creator of this class did not yet add a description for what is included in this class.

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Cyber Security
  • 19 decks
  • 2738 flashcards
  • 224 learners
Decks: Security Risk Management Srm, Security Assessment And Testing Ant, Software Development Security Dev, And more!
CompTIA Security +
  • 43 decks
  • 2139 flashcards
  • 284 learners
Decks: Fundamentals Of Security, Threat Actors, Physical Security, And more!