This class was created by Brainscape user Zack Robin. Visit their profile to learn more about the creator.

Decks in this class (22)

Monitoring and Auditing
What is signature based monitoring,
What type of monitoring has the l...,
What is anomaly based monitoring
47  cards
Planning for the worst
What is a raid,
What is raid 10,
What is raid 1
28  cards
Facilities and Physical Security
What is an embedded system,
What is a plc,
What is ot
13  cards
Policies and Procedures
Under the data ownership model wh...,
Under the data ownership model wh...,
Under the data ownership model wh...
18  cards
Network Protocols and Port Numbers
File transfer protocol ftp,
Secure shell ssh,
Tacacs
40  cards
Network Protocols and Ports (Numbers Only)
20 21,
22,
49
37  cards
Virus and Malware Types
Malicious code that runs on a mac...,
Type of virus that is stored in t...,
Type of virus that is embedded in...
33  cards
Cyber Attacks and Vulnerabilities
Vulnerability where code placed i...,
Method of accessing unauthorized ...,
When attacker is able to execute ...
43  cards
Cloud Security
What is hyperconverged infrastruc...,
What is a vdi,
What do secure enclaves and volum...
26  cards
Cryptography and Hashing
What is data at rest,
What is data in transit,
What is data in use
77  cards
Wireless Security
What wireless encryption scheme i...,
Which wireless security protocol ...,
Which wireless security protocol ...
29  cards
Risk Management
What is the definition risk in re...,
What is a vulnerability in regard...,
What is a threat in regards to cy...
39  cards
Acronyms
3des,
Aaa,
Abac
213  cards
Command Line Utilities
A network command line utility in...,
A linux command line utility for ...,
Tracert traceroutewhich one is wi...
26  cards
Social Engineering
What threat is considered most da...,
What is an insider threat,
What is phishing
7  cards
Security Protocols
A security solution that translat...,
Which version s of the snmp proto...,
Which of the protocols listed bel...
23  cards
Authentication
What is 8021x,
What is ldap,
What layer of the osi model is 8021x
31  cards
Secure Development
What is threat modeling,
When should security consideratio...,
What is the concept of least priv...
33  cards
Security Tools
Windows diagnostic command for di...,
Linux diagnostic command for disp...,
Windows utility used to determine...
39  cards
PKI
Process of verifying authenticity...,
Copies of lost private encryption...,
A trusted third party storage sol...
31  cards
Misc
What sanitization technique uses ...,
What solution would be used to id...,
What type of access control provi...
32  cards
Access Control
What is dac,
What is mac,
What is considered to be the most...
18  cards

More about
Cybersecurity

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Zack Robin's Cybersecurity flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Cyber Security
  • 19 decks
  • 2738 flashcards
  • 104 learners
Decks: Security Risk Management Srm, Security Assessment And Testing Ant, Software Development Security Dev, And more!
Cybersecurity
  • 73 decks
  • 1324 flashcards
  • 512 learners
Decks: Threat Model, First Look Into Computer Parts And Tools, Computer Parts And Tools Part 2, And more!
Cyber-Security
  • 23 decks
  • 663 flashcards
  • 412 learners
Decks: Computer Fraud And Abuse, Wireless, Radio Frequency Fundamentals, And more!
Cybersecurity
  • 33 decks
  • 1264 flashcards
  • 47 learners
Decks: Module 1 Introduction To Cybersecurity, Quiz Questions, Security, And more!
Make Flashcards