This class was created by Brainscape user Marlon M. Visit their profile to learn more about the creator.

Decks in this class (16)

1.1 Social Engineering Techniques
What is it called when somebody a...,
Phishing that uses phone calls as...,
This tactic involves spoofing an ...
22  cards
1.2 Malware Types
This type of virus never actually...,
What is maas 2,
What are two keylogger examples 3
47  cards
1.3 Application Attacks
This type of attack involves gain...,
This type of attack is the most c...,
This type of xss attack involves ...
25  cards
1.4 Network Attacks
Unauthorized access point on a ne...,
Malicious access point that has t...,
The process of sending unsolicite...
23  cards
1.5 Threat Actors, Vectors, Intelligence Sources
Actor inside the organization low...,
Actor governmental high sophistic...,
Actor has a strong purpose for so...
39  cards
1.6 Vulnerability Types
This type of attack is becoming i...,
Attacks that involve attackers wa...,
What are some good practices for ...
12  cards
1.7 Security Assessment Techniques
Threat hunting is a game of cat a...,
This is the process of combining ...,
What are the 3 main steps of inte...
14  cards
1.8 Pen Testing Techniques
This document is used to define t...,
What is the difference between a ...,
Why is it important for a pentest...
17  cards
2.1 Security Concepts in Enterprise Environments
Why is it important to keep up wi...,
This is the configuration to whic...,
Data that resides in a country is...
30  cards
2.2 Virtualization and Cloud Computing
Cloud model sometimes called hard...,
Cloud model 2,
Cloud model 3
24  cards
2.3 Application Development, Deployment, Automation Concepts
The practice of developing apps i...,
What two steps are critical to pe...,
These are created in order to def...
18  cards
2.4 Authentication and Authorization Design Concepts
What is the best way to mitigate ...,
Allows network access to other th...,
Verification that hardware on you...
19  cards
2.5 Implement Cybersecurity Resilience
Give the characteristics of raid 0 1,
Describe the characteristics of r...,
Striping with parity fault tolera...
28  cards
2.6 Embedded and Specialized Systems
Hardware and software designed fo...,
This small form factor system inv...,
An integrated circuit that can be...
14  cards
2.7 Physical Security Controls
What type of physcial control wou...,
A type of man trap that only allo...,
Prevents the data functionality o...
16  cards
2.8 Basic Cryptographic Concepts
An unencrypted message in the cle...,
An encrypted message 2,
The algorithm used to encrypt dec...
37  cards

More about
Security 601

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Marlon M's Security 601 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security+ (SY0-601)
  • 35 decks
  • 745 flashcards
  • 2151 learners
Decks: Security Overview, Malware, Malware Infections, And more!
CompTIA Security +
  • 43 decks
  • 2139 flashcards
  • 61 learners
Decks: Fundamentals Of Security, Threat Actors, Physical Security, And more!
Make Flashcards