This class was created by Brainscape user art art. Visit their profile to learn more about the creator.

Decks in this class (16)

Risk Management
What is the cia triad of security...,
Which of the following threat act...,
What is the process of having an ...
14  cards
Cryptography
Which part of the cryptography me...,
Which cipher did mike refer to as...,
What are the two different types ...
12  cards
Identity and Access Management
Which of these does mike give as ...,
Which type of access control is b...,
What determines the number of tim...
8  cards
Tools of the Trade Quiz
Which of the following items are ...,
Which of the following utilities ...,
When scanning a network which of ...
6  cards
Securing Individual Systems
Which host threat might appear as...,
Which of the following are method...,
Which of the following raid level...
15  cards
The Basic LAN
What does a switch use to filter ...,
A wan is the connection of which ...,
Which of the following will provi...
10  cards
Beyond the Basic LAN
What is the common name for the c...,
In an open network environment wh...,
If jackie adds an unauthorized wa...
19  cards
Secure Protocols
True or false any secure connecti...,
Which port number does smtp use a...,
Which port number does dns run on...
7  cards
Testing Your Infrastructure
Which vulnerability scanning tool...,
What is the most important step t...,
Which social engineering principl...
7  cards
Dealing with Incidents
In which step of incident respons...,
Which of the following does not f...,
Which type of recovery site has n...
4  cards
Practice Test 1
Which of the following is general...,
Which of the following methods of...,
Which the following is a recogniz...
89  cards
Practice Test 2
Which of the following is most ap...,
Which of the following are usuall...,
Which of the following attacks re...
89  cards
Practice Test 3
Which of the following networking...,
All of the following are consider...,
All of the following are consider...
89  cards
Practice Test 4
Josh as an administrator for a he...,
What type of attack is based on s...,
Pat is working to allocate approp...
76  cards
Extras
A server in your networks dmz was...,
You suspect that a computer in yo...,
Your organization hosts an ecomme...
32  cards
Practice Test 5
David a programmer is using the w...,
Of the following which item is a ...,
Neil a network administrator for ...
75  cards

More about
Security+

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study art art's Security+ flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
Security +
  • 10 decks
  • 250 flashcards
  • 816 learners
Decks: Practice Test 1, Practice Test 2, Practice Test 3, And more!
Make Flashcards