This class was created by Brainscape user David Stöffler-Couch. Visit their profile to learn more about the creator.

Decks in this class (18)

General Security 1
Iii,
Which control types are there,
What describes non repudiation
11  cards
General Security 2
What is technical change mangement,
What is pki,
What is key escrow
10  cards
General Security 3
Which ways are there to transfer ...,
How to encrypt decrypt in real time,
How to get symmetric keys from as...
11  cards
General Security 4
What are hashes,
What is a collission,
What are practical uses of hashes
15  cards
Threats, Vulnerabilities, Mitigation 1
How can you attribute threath actors,
What are message based vectors,
What are image based vectors
13  cards
Threats, Vulnerabilities, Mitigation 2
Name application attacks,
Which processes run in memory and...,
How can attacks use memory
10  cards
Threats, Vulnerabilities, Mitigation 3
What is eol eosl,
What are vm vulnerabilites,
What are cloud specific attacks
11  cards
Threats, Vulnerabilities, Mitigation 4
What is a logic bomb,
What is a rootkit,
What are techniques for physical ...
10  cards
Threats, Vulnerabilities, Mitigation 5
Just name application attacks,
What is csrf xsrf,
What is ssrf
10  cards
Threats, Vulnerabilities, Mitigation 6
What is a acl,
What is an application allow list,
What is isolation
9  cards
Security Architecture 1
What is a hybrid cloud,
Advantages disadvantages of hybri...,
Pros and cons of hybrid cloud
8  cards
Security Architecture 2
What is physical isolation,
What is sdn,
What is on premises security
11  cards
Security Architecture 3
What is device placement,
What are security zones,
What is connectivity and how can ...
12  cards
Security Architecture 4
Vpn concentrator,
Explain how data forwarding works...,
Ssl tls vpn
9  cards
Security Architecture 5
What types of site resiliency are...,
Geographic dispersion,
Platform diversity
11  cards
Unknown answers
What are the stages of digital fo...,
Differerence between vertical and...,
Why is inventory important
85  cards
Last Concepts
What are typical cloud based attacks,
Casb functions and implementations,
Netflow sources and features
32  cards
Fundamentals UNI
0  cards

More about
Security +

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study David Stöffler-Couch's Security + flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
Security +
  • 10 decks
  • 250 flashcards
  • 816 learners
Decks: Practice Test 1, Practice Test 2, Practice Test 3, And more!
Make Flashcards