SEC 160 Security Administration

This class was created by Brainscape user Rachman Walker. Visit their profile to learn more about the creator.

Decks in this class (18)

Module 1 - The Danger
A computer is presenting a user w...,
What is cyberwarfare it is an att...,
How can a security information an...
25  cards
Module 2 - Fighters In The War Against Cybercrime
Which personnel in a soc is assig...,
After a security incident is veri...,
Which two services are provided b...
13  cards
Module 3 - The Windows Operating System
When a user makes changes to the ...,
Which user account should be used...,
Which command is used to manually...
21  cards
Module 4 - Linux Overview
Which type of tool is used by a l...,
What is a benefit of linux being ...,
Which method can be used to harde...
17  cards
Modules 5-10: Networking Fundamentals
When a wireless network in a smal...,
Which two parts are components of...,
What is the full decompressed for...
53  cards
Module 11 - Network Communication Devices
For which discovery mode will an ...,
Which parameter is commonly used ...,
Which two protocols are considere...
24  cards
Module 12 - Network Security Infrastructure
What is the purpose of a personal...,
What is the main difference betwe...,
Which two pieces of information s...
23  cards
Modules 13-17: Threats and Attacks
What are two methods used by cybe...,
Which network tool uses artificia...,
A user is curious about how someo...
90  cards
Module 16 - Attacking the Foundation
Users in a company have complaine...,
Which type of attack involves the...,
In which tcp attack is the cyberc...
13  cards
Module 17: Attacking What We Do
Which action best describes a mac...,
What is the result of a dhcp star...,
In which type of attack is falsif...
12  cards
Module 18: Understanding Defense
How does byod change the way in w...,
Which device is usually the first...,
With the evolution of borderless ...
12  cards
Module 19: Access Control
Which component of aaa is used to...,
What is the biggest issue with lo...,
A company is experiencing overwhe...
11  cards
CyberOps Associate Final Exam
Questions located here https itex...
1  cards
CyberOps Associate (200-201) Certification Practice Exam
Questions located here https itex...
1  cards
Modules 18-20
Which type of access control appl...,
How does byod change the way in w...,
What device would be used as the ...
29  cards
Modules 24-25
Which icmp message type should be...,
How can imap be a security threat...,
Which two technologies are primar...
26  cards
Modules 26-28
Match the intrusion event defined...,
According to nist which step in t...,
8 when dealing with security thre...
26  cards
Final Exam
Which two techniques are used in ...,
What are three goals of a port sc...,
When establishing a network profi...
97  cards

More about
SEC 160 Security Administration

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Rachman Walker's SEC 160 Security Administration flashcards for their School of Hard Knocks class now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Introduction to Business Administration
  • 16 decks
  • 469 flashcards
  • 63 learners
Decks: 1 Managers In The Workplace, 2 Managing The Environment And The Organ, 3 Managing In A Global Environment, And more!
Science Sec 3
  • 22 decks
  • 719 flashcards
  • 24 learners
Decks: Systeme Digestif Et Nutrition, La Technologie, Procreation Assistee, And more!
Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
Make Flashcards