This class was created by Brainscape user Landon Todd. Visit their profile to learn more about the creator.

Decks in this class (20)

100
Agreed upon principles set forth ...,
The means of giving or restrictin...,
A table or data file that specifi...
100  cards
200
An asymmetric standard for exchan...,
An asymmetrically encrypted signa...,
An attack that involves navigatin...
100  cards
300
A message and management protocol...,
An international organization tha...,
The network layer responsible for...
100  cards
400
Anything that occurs after the fa...,
Controls intended to prevent atta...,
A state of security in which info...
100  cards
500
Filters that try to eliminate unw...,
A form of phishing in which the m...,
An attempt by someone or somethin...
100  cards
600
92 128 256 bit bit key strength,
168 bit key strength,
160 bit key strength
100  cards
700
A notification that an unusual co...,
The series of steps formula proce...,
The component or process that ana...
100  cards
800
Layer 1 of the osi model,
Layer 2 of the osi model,
Layer 3 of the osi model
100  cards
900
Gives an organization the ability...,
List at least three potential rep...,
What is a plan that defines the p...
97  cards
1000
A network that does not have serv...,
A policy that outlines how the or...,
A written document that states ho...
97  cards
1100
A symmetric cipher that was desig...,
A chip on the motherboard of the ...,
A later derivation of the blowfis...
100  cards
1200
An organization that purchased se...,
Each of the following can be clas...,
__________ are a network of attac...
100  cards
1300
What is unique about a cross site...,
Each of the following can be used...,
A cookie that was not created by ...
100  cards
1400
Which of the following cannot be ...,
A __________ can be used to secur...,
Which of the following is not use...
100  cards
1500
The encryption protocol standard ...,
An attack that sends unsolicited ...,
An attack that accesses unauthori...
100  cards
1600
Which of the following attacks on...,
What is a hybrid attack a an atta...,
Each of the following is a step i...
18  cards
Questions 0-200
Which part of the security polici...,
Which of the following is necessa...,
Which of the following will not b...
195  cards
Question set 2
Question 1 which of the following...,
Question 2 a network analyst rece...,
Question 3 a security administrat...
20  cards
Question Set 4
Who is responsible for establishi...,
Which access control system allow...,
Which of the following access con...
242  cards
Question set 501
Q1 which of the following is the ...,
Q2 which of the following policie...,
Q3 if you wish to carry bulk data...
100  cards

More about
Security

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Landon Todd's Security flashcards for their Jacksonville University class now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Security+ SY0-601
  • 37 decks
  • 832 flashcards
  • 398 learners
Decks: 10 Acronyms, 11 Social Engineering Techniques, 12 Malware Types, And more!
French
  • 121 decks
  • 6695 flashcards
  • 1289 learners
Decks: Expressions 3, Vocab 68, Vocab 66, And more!
Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
Make Flashcards