CyberSecurity Essentials AIT-660

This class was created by Brainscape user Fernando Nakano. Visit their profile to learn more about the creator.

Decks in this class (19)

Chapter 18 (Lesson 12)
1 what are the major categories o...,
2 what is the main motivation beh...,
3 what is the difference between ...
27  cards
Chapter 17 (Lesson 12)
1 what are the key rights guarant...,
2 what are some common questions ...,
3 what are some common steps that...
23  cards
Chapter 16 (Lesson 11)
1 what are some of the main conce...,
2 list and explain the five types...,
3 explain the differences between...
23  cards
Chapter 15 (Lesson 11)
Why is it important to include le...,
What is wrong with the seat of th...,
What is the difference between qu...
25  cards
Chapter 11 (Lecture 10)
1 name at least seven security mo...,
2 describe the primary components...,
3 what are the two primary rules ...
24  cards
Chapter 10 (Lecture 9)
1 explain the process bob should ...,
2 explain the process alice would...,
3 explain the process bob should ...
53  cards
Chapter 9 (Lecture 8)
What is the major hurdle preventi...,
Encrypt the message i will pass t...,
Decrypt the message f r q j u d w...
47  cards
Chapter 8 (Lecture 7)
What is the major difference betw...,
Explain the four propagation meth...,
What are the actions an antivirus...
57  cards
Quiz3_Answers
For a given desired strength of a...,
Which of the following functions ...,
A software developer wants to pre...
25  cards
Chapter 7 ( Lecture 6)
1 how does a worm travel from sys...,
2 describe three benefits of usin...,
3 what are the three requirements...
28  cards
Chapter 6
1 name six different administrati...,
2 what are the basic formulas use...,
3 describe the process or techniq...
44  cards
Chapter 5
1 discuss and describe the cia triad,
2 what are the requirements to ho...,
3 describe the benefits of change...
35  cards
Chapter 4
Describe the differences between ...,
Discuss the benefits of nat,
What are the main differences bet...
36  cards
Chapter 3
1 name the layers of the osi mode...,
Name three problems with cabling ...,
What are the various technologies...
47  cards
Chapter 3 (Part 2)
Osi 7 layers,
Tcp ip layers,
Tcp ip application
15  cards
Chapter 2
1 list three elements to identify...,
2 name at least three types of at...,
3 describe the relationship betwe...
22  cards
Chapter 1
Name at least seven access contro...,
Describe the three primary authen...,
Name the method that allows users...
34  cards
Quiz1_Answers
1 a subject can identify itself b...,
2 in mandatory access control acc...,
3 at which layer of the osi proto...
30  cards
Quiz2_Answers
1 database transactions must be d...,
2 which one of the following stat...,
3 which of the following mechanis...
53  cards

More about
CyberSecurity Essentials AIT-660

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Fernando Nakano's CyberSecurity Essentials AIT-660 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

AIT 660
  • 10 decks
  • 368 flashcards
  • 19 learners
Decks: Encryption, Lecture 10 Book Questions, Lecture 10 Notes, And more!
IDE 660
  • 14 decks
  • 556 flashcards
  • 18 learners
Decks: Chapter 1 Readings, Chapter 2 Reading, Chapter 3, And more!
AIT
  • 41 decks
  • 719 flashcards
  • 5 learners
Decks: Ch 1 Intro To Ems, Ch 2 Well Being Of The Emt, Ch 3 Lifting And Moving Patients, And more!
Make Flashcards