This class was created by Brainscape user Nicholas McCarthy. Visit their profile to learn more about the creator.

Decks in this class (15)

Study Guide - Assessment Test
1 after running an nmap scan of a...,
4 which of the following vulnerab...,
Security researchers recently dis...
22  cards
Study Guide - Chapter 2: System and Network Architecture
1 naomi wants to make her applica...,
Sase 2,
3 tom wants to set an appropriate...
24  cards
Study Guide - Chapter 3: Malicious Activity
1 which of the following linux co...,
Lsof 2,
2 what windows tool provides deta...
26  cards
Study Guide - Chapter 4: Threat Intelligence
1 which of the following measures...,
3 which of the following activiti...,
Threat intelligence cycle steps 3
22  cards
Study Guide - Chapter 5: Reconnaissance and Intelligence Gathering
1 megan wants to use the metasplo...,
Wmap 2,
Smb_login 3
22  cards
Study Guide - Chapter 6: Designing a Vulnerability Management Program
1 what federal law requires the u...,
Fisma 2,
Glba 3
26  cards
Study Guide - Chapter 7: Analyzing Vulnerability Scans
1 tom is reviewing a vulnerabilit...,
2 which one of the cvss metrics w...,
Cvss metrics 3
15  cards
Study Guide - Chapter 8: Responding to Vulnerabilities
1 jen identified a missing patch ...,
2 you notice a high number of sql...,
3 aziz is responsible for the adm...
24  cards
Study Guide - Chapter 9: Building an Incident Response Program
1 which one of the following is a...,
2 during what phase of the incide...,
Phases of the incident response p...
21  cards
Study Guide - Chapter 10: Incident Detection and Analysis
2 hui wants to comply with a lega...,
5 renee wants to adopt an open io...,
6 chris wants to use an active mo...
14  cards
Study Guide - Chapter 11: Containment, Eradication, and Recover
2 which one of the following crit...,
3 alice is responding to a cybers...,
4 alice confers with other team m...
23  cards
Study Guide - Chapter 12: Reporting and Communication
1 why should organizations predet...,
Valentine is preparing a vulnerab...,
3 jake wants to identify stakehol...
11  cards
Study Guide - Chapter 13: Performing Forensic Analysis and Techniques for Incident Response
1 which format does dd produce fi...,
3 mike is conducting a root cause...,
Dd 3
21  cards
Study Guide - Practice Exam 1
9 kevin is configuring a web base...,
Webhook 2,
11 saanvi is starting his inciden...
44  cards
Practice Tests - Chapter 1: Domain 1.0: Security Operations
4 what term is used to describe t...,
Isac 2,
5 singh incorporated the cisco ta...
48  cards

More about
CySA+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Nicholas McCarthy's CySA+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Comptia CYSA+
  • 37 decks
  • 1033 flashcards
  • 76 learners
Decks: Threat Intelligence Sharing, Classifying Threats, Network Forensics, And more!
CYSA+
  • 14 decks
  • 513 flashcards
  • 91 learners
Decks: Chapter 1 Defending Against Cybersecurit, Chapter 2 Reconnaissance And Intelligenc, Chapter 3 Designing A Vulnerability Mana, And more!
CySA+ CS0-001
  • 26 decks
  • 1506 flashcards
  • 87 learners
Decks: 10 Threat Management, 11 Threat Management, 12 Threat Management, And more!
CySA+
  • 9 decks
  • 405 flashcards
  • 55 learners
Decks: Lesson 1, Lesson 2 Using Threat Intelligence, Lesson 3 Reconnaissance And Intelligence, And more!
Make Flashcards