Pro Messer: Security+

This class was created by Brainscape user Eugene Samuel.

By:

Decks in this class (120)

1.1 Security Control Types and Categories
What are security risks 1,
What is the scope of protection i...,
What is the purpose of security c...
31  cards
1.2 The CIA Triad: A Study Guide
What does the cia triad represent 1,
What is the primary goal of confi...,
Name one common method used to ac...
22  cards
1.2 Digital Signatures: Ensuring Integrity and Origin - Study Guide
What is non repudiation 1,
Why is non repudiation a key goal...,
Define proof of integrity 3
25  cards
1.2 AAA Framework and Authorization
What are the three core component...,
What does authentication address ...,
What does authorization determine...
26  cards
1.2 IT Security Gap Analysis: A Comprehensive Study
What is the definition of gap ana...,
What is the primary purpose of ga...,
What makes gap analysis a complex...
23  cards
1.2 Zero Trust Networks and Adaptive
What is the core philosophy of ze...,
How does traditional network secu...,
List the key principles of zero t...
21  cards
1.2 Physical Security Controls: Methods and Technologies
What is the importance of physica...,
Define barricades and their purpo...,
What are some examples of barrica...
26  cards
1.2 IT Security Deception and Disruption: Honeypots, Honeyfiles, and Honeytokens
What is the primary objective of ...,
Define a honeypot in the context ...,
How do honeypots help it security...
18  cards
1.3 Formal Change Control Processes: A Study Guide
What is the primary difference in...,
Why is it crucial for organizatio...,
What are rollback procedures 3
21  cards
1.3 The Technician's Role in Change Control Implementation
What is the core concept of chang...,
Why is implementing changes more ...,
What is the primary responsibilit...
33  cards
1.4 Cybersecurity Cryptography: Encryption and Public Key Infrastructure
What is the definition of public ...,
What is the purpose of public key...,
What is a certificate authority ca 3
23  cards
1.4 Data Encryption and Its Algorithms
What is data at rest encryption 1,
Name two common operating system ...,
What is the purpose of the encryp...
31  cards
1.4 Secure Key Exchange Methods
What is the fundamental problem o...,
What is the goal of key exchange 2,
Define out of band key exchange 3
22  cards
1.4 Cryptography's Guardians: TPM, HSM, and Secure Enclaves
What is the primary function of a...,
How does a tpm contribute to secu...,
In what type of computing environ...
10  cards
1.4 Obfuscation and Hidden Data Techniques
What is the definition of obfusca...,
What is the primary purpose of ob...,
What does reversibility in obfusc...
21  cards
1.4 Cryptographic Hashes and Digital Signatures
What is the primary function of a...,
What are some common alternative ...,
What is the key difference betwee...
25  cards
1.4 Blockchain Essentials
What is blockchain technology 1,
Define blockchain 2,
Explain the primary function of b...
21  cards
1.4 Digital Certificates
What is a digital certificate 1,
What are the core components of a...,
What is the role of a digital cer...
18  cards
2.1 Understanding Threat Actors
What is the primary definition of...,
Why is understanding a threat act...,
What are two attributes commonly ...
18  cards
2.2 Navigating Threat Vectors and Attack Paths
What is the primary difference be...,
How can messaging systems like em...,
Explain how scalable vector graph...
26  cards
2.2 The Art of Phishing: Recognizing and Avoiding Scams
What is the primary goal of a phi...,
List three common communication m...,
Besides login credentials what ot...
17  cards
2.2 The Impersonation Playbook: Scams, Fraud, and Prevention
What is the core definition of im...,
Provide two examples of how an at...,
What is vishing 3
18  cards
2.2 Cybersecurity Fundamentals: Watering Hole Attacks and Layered Defense
What is a watering hole attack 1,
How does a watering hole attack d...,
What are the initial steps an att...
20  cards
2.2 The Digital Deception Playbook
What is the primary difference be...,
How do influence campaigns primar...,
Describe the initial steps an att...
24  cards
2.3 Malware Memory Injection: Understanding the Threat
What is the fundamental requireme...,
Besides running as its own proces...,
What is one significant advantage...
20  cards
2.3 Buffer Overflow Attacks
What constitutes a buffer overflo...,
How does an attacker exploit a bu...,
Why is bounds checking important ...
23  cards
2.3 Race Conditions and TOCTOU Attacks
What is a race condition in the c...,
How does a toctou attack differ f...,
What is the core flaw in the bank...
20  cards
2.3 Secure Software Updates
Why is it important to keep opera...,
What risks are associated with no...,
What inherent risk arises when in...
32  cards
2.3 Operating System Patching
Why are security professionals co...,
What makes operating systems an a...,
How does the complexity of an ope...
15  cards
2.3 Understanding Code and SQL Injection Attacks
What is a code injection attack 1,
What is a sql injection sqli 2,
How does sql injection exploit a ...
19  cards
2.3 Code Injection Attack
What is a code injection attack 1,
What makes a code injection attac...,
What is the primary factor for th...
20  cards
2.3 Understanding Cross-Site Scripting (XSS) Attacks
Why is the abbreviation xss used ...,
What fundamental principle do xss...,
What common scripting language is...
27  cards
2.3 IoT Firmware and Device Lifecycle Security
What distinguishes iot devices fr...,
Why do iot devices pose a signifi...,
What is firmware in the context o...
17  cards
2.3 Virtual Machine Security Vulnerabilities
What makes managing the security ...,
Name two security vulnerabilities...,
Explain the concept of a vm escap...
21  cards
2.3 Cloud Security: Understanding Threats and Vulnerabilities
What is the significance of wides...,
What type of data and application...,
Why is maintaining security for c...
31  cards
2.3 Supply Chain Security and Third-Party Risk
What is the supply chain 1,
What are the key stages of the su...,
Why is every step of the supply c...
29  cards
2.3 Cybersecurity Vulnerabilities and Countermeasures
What is one common way attackers ...,
Describe the superuser account vu...,
Why are protocols like telnet and...
25  cards
2.3 Mobile Device Security: Risks and Countermeasures
Why is mobile device security con...,
What types of sensitive informati...,
What is the difference between ro...
17  cards
2.3 Zero-Day Vulnerabilities and Attacks
What is a zero day vulnerability 1,
Who are the primary groups search...,
Why do attackers prefer to find v...
23  cards
2.4 Understanding Malware
Define malware in your own words ...,
Explain the concept of a trojan h...,
Describe how different types of m...
26  cards
2.4 Understanding Computer Viruses and Worms
What is a computer virus 1,
What distinguishes a worm from a ...,
Define replication in the context...
27  cards
2.4 Digital Intruders: Spyware and Bloatware
What is the primary function of s...,
Name three common ways spyware ca...,
How does a keylogger associated w...
19  cards
2.4 Cybersecurity Threats: Keyloggers, Logic Bombs, and Rootkits
What is a keylogger 1,
What types of information do keyl...,
How do keyloggers operate 3
22  cards
2.4 DNS Poisoning and URL Hijacking
What is the purpose of the domain...,
How does a computer obtain an ip ...,
What is a local host file 3
27  cards
2.4 Wireless Network Attacks: Deauthentication and RF Jamming
What is the primary characteristi...,
What specific vulnerability in ea...,
Why are management frames sent in...
22  cards
2.4 Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
What is a denial of service dos a...,
Name two methods an attacker migh...,
What is self inflicted dos 3
21  cards
2.4 On-Path and Man-in-the-Middle Attacks
What is the primary characteristi...,
Why might an on path attack be pa...,
Where does an arp poisoning attac...
21  cards
2.4 Replay Attacks and Session Hijacking
What is client server communicati...,
What is a replay attack 2,
Define on path attack 3
24  cards
2.4 Malicious Code Attacks and Defenses
What is the definition of malicio...,
How do attacks that rely on user ...,
List three common forms that mali...
17  cards
2.4 Application Security Fundamentals
What is an injection attack 1,
Why is injection attack a common ...,
How does a buffer overflow attack...
20  cards
2.4 Cryptography's Vulnerabilities
What is the purpose of cryptograp...,
What is the role of the key in en...,
Why are cryptographic protocols a...
28  cards
2.4 Password Hashes and Brute Force Attacks
Why is storing passwords in the c...,
What is the recommended alternati...,
What is a hash in the context of ...
24  cards
2.4 Indicators of Compromise and Security Best
What constitutes an indicator of ...,
Give an example of an ioc related...,
What is an impossible login 3
50  cards
2.5 Network Segmentation and Access
What is the primary purpose of ne...,
Describe the difference between p...,
How can network segmentation impr...
17  cards
2.5 Cybersecurity Mitigation Techniques and Best Practices
What is the definition of mitigat...,
What is the purpose of patching k...,
What are the benefits of patching 3
29  cards
2.5 System and Endpoint Hardening Fundamentals
What is system hardening 1,
Why is system hardening important 2,
Name two best practices for secur...
28  cards
3.1 Cloud Infrastructure
What is the primary purpose of a ...,
How might a contract between an o...,
What is one main challenge associ...
11  cards
3.1 Network Isolation, Virtualization, and Cloud Infrastructure
What is the primary concern in ne...,
Explain the concept of an air gap...,
Provide an example of how physica...
22  cards
3.1 IT Security Considerations and Infrastructure Technologies
What is cloud based security 1,
What are the advantages of cloud ...,
What are the disadvantages of clo...
24  cards
3.1 IT Infrastructure and Operational Resilience
What is availability in the conte...,
How do it organizations typically...,
What does mttr stand for and what...
16  cards
3.2 Network Security Zones and Attack Surfaces
What are diverse network characte...,
What is the primary role of firew...,
Name three security technologies ...
23  cards
3.2 Intrusion Prevention and Detection Systems
What is the primary function of a...,
What is the primary function of a...,
What is the difference between fa...
21  cards
3.2 Network Appliances:
What is the primary purpose of a ...,
How does a proxy server improve n...,
What is the key difference betwee...
16  cards
3.2 Port Security
What is port security 1,
Why is port security important in...,
How might an end user experience ...
25  cards
3.2 Network Firewall Concepts
What is the fundamental purpose o...,
Where are firewalls commonly depl...,
What additional security function...
23  cards
3.2 Secure Network Communication Technologies (VPN, SD-WAN, and SASE)
What is the primary function of a...,
What key action does a vpn perfor...,
What is a vpn concentrator 3
20  cards
3.3 Data Types and Classifications
What distinguishes regulated data...,
How does the source describe the ...,
Explain the concept of intellectu...
17  cards
3.3 States of Data, Security, and Sovereignty
Define data at rest and provide t...,
What is the primary difference be...,
Why is encryption often recommend...
19  cards
3.3 Data Protection Methods and Security Techniques
What are geographic restrictions ...,
How does determining location dif...,
Define geofencing and provide a p...
22  cards
3.4 High Availability and Resilience Architectures
What is high availability ha 1,
How do servers within a cluster m...,
What is the primary function of a...
18  cards
3.4 Cryptography's Vulnerabilities: Birthday Attacks and SSL Stripping
What is the central challenge in ...,
Describe the two negative outcome...,
What are the three core component...
19  cards
3.4 A Beginner's Guide to Keeping Systems Running: Understanding Disaster Recovery
What is the first step in disaste...,
What is a recovery test 2,
What are the key characteristics ...
16  cards
3.4 Backup Strategies and Recovery
What are the primary variables an...,
Describe the key characteristics ...,
Explain the purpose of an off sit...
21  cards
3.4 Data Center Power and Backup Systems
Why is it critical for data cente...,
What is an uninterruptible power ...,
Define the terms blackout brownou...
16  cards
4.1 Application Security Baselines and Deployment
What is the purpose of establishi...,
What types of components are typi...,
What is the recommended course of...
10  cards
4.1 System and Device Hardening
Why is it necessary to harden an ...,
What is the purpose of data segme...,
What is a security benefit of dat...
22  cards
4.1 Wireless Site Surveys and Mobile Device Management
What is the primary purpose of co...,
What does a heat map represent in...,
Under what circumstances would a ...
21  cards
4.1 Wireless Network Security Protocols and Authentication
What are the three fundamental se...,
What is the primary security vuln...,
How does the wpa3 protocol specif...
17  cards
4.1 Application Security Development and Testing
What is the primary task of it pr...,
What process is used to ensure th...,
What is input validation in appli...
24  cards
4.2 Asset Management
What is the initial step in the p...,
Who collaborates with the end use...,
What must be analyzed to determin...
26  cards
4.3 Vulnerability Scanning
What is the purpose of vulnerabil...,
What is a port scan 2,
True or false every open port is ...
15  cards
4.3 Threat Intelligence
What is expected of an it securit...,
What should an it security profes...,
What is the role of threat intell...
17  cards
4.3 Penetration Testing
What is penetration testing 1,
How does penetration testing diff...,
Why do some organizations perform...
20  cards
4.3 Analyzing Vulnerabilities
What is a false positive in the c...,
What is a false negative in vulne...,
What should be done to minimize f...
19  cards
4.3 Vulnerability Remediation
What is the primary method to mit...,
What is a zero day vulnerability 2,
How often are security patches ty...
17  cards
4.4 Security Monitoring
What is the primary reason for mo...,
What types of activities should b...,
What is a siem 3
21  cards
4.4 Security Tools
What is scap 1,
What is the main purpose of scap 2,
What does a vulnerability scanner...
37  cards
4.5 Firewalls
What is a network based firewall 1,
What are the two main types of fi...,
What additional services can a fi...
32  cards
4.5 Web Filtering
What is the purpose of a firewall...,
What is a content filter 2,
What do content filters control 3
22  cards
4.5 Operating System Security
What is active directory 1,
What is stored in the active dire...,
How do users authenticate to devi...
11  cards
4.5 Secure Protocols
What is one of the best ways to p...,
Which protocols are commonly used...,
How can you determine if traffic ...
14  cards
4.5 Email Security
What is the main issue with email...,
What does it mean when an email i...,
Who is primarily concerned about ...
18  cards
4.5 Monitoring Data
What is a file integrity monitor ...,
What utility does windows use for...,
What is tripwire 3
19  cards
4.5 Endpoint Security
What is the endpoint in a network 1,
What can applications running on ...,
What is required to identify mali...
27  cards
4.6 Identity and Access Management
What does iam stand for 1,
What is the beginning and end of ...,
What does iam determine 3
29  cards
4.6 Access Controls
What is access control 1,
What is the best practice associa...,
What does least privilege mean 3
17  cards
4.6 Multifactor Authentication
What is the term for the various ...,
What is an example of something y...,
Fill in the blank a personal iden...
17  cards
4.6 Password Security
What is the primary goal when cre...,
What characteristics should an id...,
What is the recommended minimum l...
18  cards
4.7 Scripting and Automation
What is the primary function of s...,
How does scripting help in proble...,
What advantage does scripting pro...
27  cards
4.8 Incident Response
What is an important part of a se...,
What can happen when a user click...,
What is a distributed denial of s...
20  cards
4.8 Incident Planning
What should be done before an act...,
What type of systems should be us...,
Why is it important to evaluate p...
17  cards
4.8 Digital Forensics
What is digital forensics 1,
What is rfc 3227 2,
What are best practices in digita...
17  cards
4.9 Log Data
What type of information is commo...,
What can firewall logs provide in...,
What additional capabilities do n...
31  cards
5.1 Security Policies
What is the primary goal of every...,
What do security policies provide 2,
What is the aup 3
18  cards
5.1 Security Standards
What do standards in the technolo...,
What are two organizations that p...,
What is a key aspect of password ...
20  cards
5.1 Security Procedures
What is change management 1,
What does change management help ...,
What is the first step in the cha...
24  cards
5.1 Security Considerations
What must it security professiona...,
What is sarbanes oxley abbreviate...,
What does sarbanes oxley focus on 3
17  cards
5.1 Data Roles and Responsibilities
Who is typically responsible for ...,
What is the role of a data owner 2,
Who would be the data owner for f...
10  cards
5.2 Risk Management
What is the primary purpose of ri...,
How does the size of an organizat...,
What are the two sources of threa...
14  cards
5.2 Risk Analysis
What is a qualitative risk assess...,
How can a qualitative risk assess...,
What might be the overall risk le...
20  cards
5.2 Risk Management Strategies
What is one strategy an organizat...,
What is an example of risk transf...,
What does it mean for a company t...
24  cards
5.2 Business Impact Analysis
What is the technical term for th...,
What does rto stand for 2,
What is meant by the term recover...
12  cards
5.3 Third-party Risk Assessment
What is a vendor in the context o...,
Why is it important to perform a ...,
What should be included in the co...
24  cards
5.3 Agreement Types
What is a service level agreement...,
What might be a requirement in an...,
What is a memorandum of understan...
12  cards
5.4 Compliance
What is compliance 1,
What can happen if an organizatio...,
Who is typically responsible for ...
20  cards
5.4 Privacy
What do organizations collect tha...,
At what levels do privacy laws st...,
What is an example of a national ...
15  cards
5.5 Audits and Assessments
What is the purpose of a cybersec...,
What does the term attestation re...,
Can audits be performed internally 3
11  cards
5.5 Penetration Tests
What is physical penetration test...,
Why is physical access to a devic...,
What common security measure is t...
18  cards
5.6 Security Awareness
What is the purpose of running a ...,
How can a company execute a phish...,
What type of report does an autom...
19  cards
5.6 User Training
What is a best practice for provi...,
Why is specialized security train...,
Who else should receive security ...
22  cards

More about
Pro Messer: Security+

  • Full test name Unspecified
  • Test acronym Unspecified

The creator of this class did not yet add a description for what is included in this class.

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security +
  • 43 decks
  • 2139 flashcards
  • 284 learners
Decks: Fundamentals Of Security, Threat Actors, Physical Security, And more!
Professor Messer
  • 49 decks
  • 1374 flashcards
  • 50 learners
Decks: 11, 12, 13, And more!
Španělština nejen pro samouky
  • 88 decks
  • 7456 flashcards
  • 2 learners
Decks: L01, L01, L02, And more!