Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401)

This class was created by Brainscape user Aaron Patty. Visit their profile to learn more about the creator.

Decks in this class (40)

Module 3 - Basics of Security - Q&A
Which of the following two relati...,
Which of the three security goals...,
Which of the following supporting...
10  cards
Module 4 - Understanding Security Governance - Q&A
Which of the following is the hig...,
Which of the following describes ...,
All of the following are reasons ...
10  cards
Module 5 - Risk Management - Q&A
Which of the following could be c...,
Which of the following would be a...,
A __________ is a weakness inhere...
10  cards
Module 6 - IT Risk Assessment - Q&A
Which of the following is express...,
What does sle stand for and how i...,
Which elements of risk are the pr...
13  cards
Module 7 - Understanding Cryptography - Q&A
Data that is said to be easily re...,
Which of the following is the pro...,
Which of the following terms desc...
26  cards
Module 8 - Cryptographic Methods - Q&A
How many rounds does des use in i...,
Which of the following algorithms...,
Which of the following is a symme...
10  cards
Module 9 - Application of Cryptographic Methods - Q&A
Which type of algorithm is typica...,
Which of the following security p...,
Which of the following security p...
10  cards
Module 10 - Public Key Infrastructure - Q&A
Pki primarily depends upon the pr...,
Which of the following standards ...,
If an individual encrypts a messa...
10  cards
Module 11 - Understanding Identification and Authentication - Q&A
Which of the following is the pro...,
Each of the following would be co...,
Which of the following authentica...
10  cards
Module 12 - Understanding Authorization - Q&A
Which of the following terms desc...,
Which of the following states tha...,
Not allowing system administrator...
10  cards
Module 13 - Authentication Methods & Services - Q&A
Which of the following allows a u...,
Which of the following would use ...,
Which of the following authentica...
10  cards
Module 14 - User Account Management - Q&A
Which of the following methods ar...,
Which of the following is used in...,
Which of the following terms desc...
10  cards
Module 15 - Host Threats - Q&A
Which of the following characteri...,
Which of the following types of m...,
Which of the following types of m...
10  cards
Module 16 - Host Hardening - Q&A
All of the following are characte...,
You have an external dns server t...,
Which of the following should alw...
10  cards
Module 17 - Hardening Host Network Services - Q&A
Which of the following statements...,
Which of the following is an impo...,
Which of the following is a true ...
10  cards
Module 18 - Storage Security - Q&A
Which of the following is a stora...,
Which of the following is an ethe...,
Which of the following are valid ...
10  cards
Module 19 - Static Hosts - Q&A
Which of the following would be c...,
Which of the following has an ope...,
All of the following are characte...
10  cards
Module 20 - LAN Security - Q&A
Which one of the following types ...,
Which network device is used to s...,
Which type of device is used to p...
10  cards
Module 21 - Network Threats - Q&A
Which one of the following terms ...,
All of the following are characte...,
Intercepting a user s credentials...
10  cards
Module 22 - Network Hardening - Q&A
Which of the following describes ...,
Which of the following is an adva...,
Which of the following types of c...
10  cards
Module 23 - Network Monitoring - Q&A
Which of the following are valid ...,
Which of the following is an impo...,
Which of the following are valid ...
10  cards
Module 24 - Host Application Threats - Q&A
Which of the following terms desc...,
Which of the following is used to...,
Which of the following attacks ca...
10  cards
Module 25 - Web Application Threats - Q&A
Which of the following web applic...,
Which of the following could make...,
Which of the following are small ...
6  cards
Module 26 - Application Hardening - Q&A
Which of the following are valid ...,
Which of the following is an impo...,
Which of the following should be ...
10  cards
Module 27 - Internet Service Hardening - Q&A
Which of the following are method...,
Which of the following ports does...,
Which of the following protocols ...
10  cards
Module 28 - Virtualization Security - Q&A
Which of the following statements...,
A bare metal h ypervisor is also ...,
A virtual machine that gets its i...
10  cards
Module 29 - Wireless Threats - Q&A
Which of the following would desc...,
Which of the following can happen...,
Which of the following older atta...
10  cards
Module 30 - Wireless Hardening - Q&A
Which of the following was the fi...,
Which of the following was a temp...,
How many characters can a wpa wpa...
10  cards
Module 31 - Environmental Security and Controls - Q&A
All of the following are causes o...,
Which of the following are possib...,
Which of the following types of f...
10  cards
Module 32 - Perimeter and Physical Controls - Q&A
To which of the following types o...,
Which of the following control fu...,
All of the following are characte...
10  cards
Module 33 - Third-Party Security - Q&A
Which of the following is not an ...,
Which of the following must be in...,
Which of the following issues wil...
10  cards
Module 34 - Cloud Security
Which of the following can be out...,
Which of the following cloud serv...,
All of the following are usually ...
10  cards
Module 35 - Mobile Security - Q&A
Which of the following are ways t...,
Which of the following cannot be ...,
Which of the following involves i...
10  cards
Module 36 - Social Engineering - Q&A
Which of the following elements i...,
Which of the following are human ...,
All of the following are potentia...
10  cards
Module 37 - Security Training - Q&A
Which of the following is the mos...,
Which of the following is likely ...,
Your manager wants you to develop...
10  cards
Module 38 - Security Assessment - Q&A
Which of the following types of a...,
Which of the following are approp...,
Your manager wants you to attempt...
10  cards
Module 39 - Incident Response - Q&A
All of the following are consider...,
Which of the following is the fir...,
Which of the following should the...
10  cards
Module 40 - Forensics Procedures - Q&A
When a forensics investigator inv...,
In addition to collecting evidenc...,
When you are collecting evidence ...
10  cards
Module 41 - Business Continuity - Q&A
All of the following are consider...,
Which of the following is conside...,
Which of the following activities...
10  cards
Module 42 - Disaster Recovery - Q&A
All of the following are consider...,
Which of the following is conside...,
Which of the following dictates w...
10  cards

More about
Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401)

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Aaron Patty's Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401) flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

SY0-401 Security+
  • 1 decks
  • 159 flashcards
  • 14 learners
Decks: Network Security, And more!
Mike Meyers' CompTIA A+ Certification...
  • 7 decks
  • 165 flashcards
  • 30 learners
Decks: Operating Systems 1, Operating Systems 2, Security 1, And more!
Make Flashcards