Security Comp TIA 701

This class was created by Brainscape user Dominic Asio. Visit their profile to learn more about the creator.

Decks in this class (75)

Security Controls 1.1
Technical controls 1,
Examples of technical controls 2,
Operational controls 3
42  cards
THE CIA/AIC Triad 1.2
Confidentiality 1,
Integrity 2,
Aic availability 3
14  cards
Non-Repudiation 1.2
Describe the concept of proof of ...,
How does a hash contribute to pro...,
What happens to a hash if the dat...
7  cards
Authentication, Authorization, & Account 1.2
Describe the step of identificati...,
Describe the step of authenticati...,
What is the purpose of the author...
11  cards
Gap Analysis 1.2
Describe gap analysis 1,
General process of a gap analysis 2,
What is the first step in initiat...
10  cards
Zero Trust 1.2
Describe zero trust 1,
Through a zero trust policy what ...,
What is the purpose of separate f...
15  cards
Physical Security 1.2
Uses of barricades bollards 1,
Access control vestibules 2,
Use of access control vestibules 3
10  cards
Deception and Disruption 1.2
Describe the use of a honeypots 1,
Describe the application of honey...,
Describe the use of honeyfiles in...
5  cards
Change Management 1.3
What is the importance of change ...,
What are issues that can arise if...,
What is the purpose of having a f...
18  cards
Technical Change Management 1.3
Describe the technical change man...,
What are some important considera...,
What are some important considera...
16  cards
Public Key Infrastructure 1.4
Describe public key infrastructur...,
Describe a symmetric encryption 2,
What are the benefits in using sy...
8  cards
Encrypting Data 1.4
What is data at rest 1,
What is the purpose of an encrypt...,
What is the purpose of transparen...
11  cards
Key Exchange 1.4
What is the purpose of a key exch...,
How is a key exchange performed u...,
How is a key exchange performed u...
4  cards
Encyrption Technologies 1.4
Describe a trusted platform module 1,
Hardware security module hsm 2,
Cryptographic functions of the hsm 3
8  cards
Obfuscation 1.4
Obfuscation 1,
Obfuscation strategies 2,
Common stenography image strategi...
8  cards
Hashing and Digital Signatures 1.4
Hashes 1,
Use of hashes 2,
Collision 3
13  cards
Blockchain Technology 1.4
Blockchain 1,
Applications of the blockchain 2,
Integrity of the blockchain 3
3  cards
Certificates 1.4
Digital certificate 1,
Public key certificate 2,
Public key infrastructure 3
14  cards
Threat Actors 2.1
Threat actors 1,
Interal threat actors 2,
Medium level of sophistication fo...
14  cards
Common Threat Vector 2.2
Threat vector 1,
Attack vector 2,
Message based vectors 3
20  cards
Phishing 2.2
Phishing 1,
Business email compromise 2,
Typosquatting 3
6  cards
Impersonation 2.2
Impersonation 1,
Ways for impersonation 2,
Eliciting information 3
6  cards
Watering Hole Attacks 2.2
Watering hole attack 1,
Executing a watering hole attack 2,
Defense in depth 3
3  cards
Misinformation and Disinformation 2.2
Influence campaigns 1,
Misinformation process 2,
Brand impersonation 3
3  cards
Memory Injections 2.3
Dynamic link library dll 1,
Dll injection 2
2  cards
Buffer Overflows 2.3
Buffer overflows 1,
Solution for buffer overflows 2
2  cards
Race Condition 2.3
Race condition 1,
Time of check time of use attack 2
2  cards
Malicious Updates 2.3
Blank 1
1  cards
Operating System Vulnerabilities 2.3
Operating systems os 1,
Best practices for os vulnerabili...
2  cards
SQL Injection 2.3
Code injection attacks 1,
Types code injection 2,
Sql injection attack 3
4  cards
Cross Site Scripting 2.3
Cross site scripting xss 1,
Non persistent xss attack 2,
Persistent stored xss attack 3
4  cards
Hardware Vulnerabilities 2.3
Internet of things iot 1,
Firmware 2,
End of life eol 3
8  cards
Virtualization Security 2.3
Virtual machines vm 1,
Hypervisor 2,
Vm vulnerabilities 3
10  cards
Cloud-Specific Vulnerabilities 2.3
Security in the cloud 1,
Denial of service dos 2,
Directory traversal 3
5  cards
Supply Chain Attack 2.3
Supply chain vector 1,
Supply chain 2,
Service provider vector 3
6  cards
Misconfiguration Vulnerabilities 2.3
Permissions 1,
Open permissions 2,
Administrative root accounts 3
9  cards
Mobile Device Vulnerabilities 2.3
Mobile device security 1,
Jailbreaking 2,
Rooting 3
5  cards
Zero-Day Vulnerabilities 2.3
Zero day 1,
Zero day attack 2
2  cards
An Overview of Malware 2.4
Malware 1,
Purpose of malware 2,
Ransomware 3
7  cards
Virus and Worms 2.4
Viruses 1,
Anti virus av products 2,
Program virus 3
9  cards
Spyware and Bloatware 2.4
Spyware 1,
Keyloggers 2,
Protection against spyware 3
5  cards
Other Malware Types 2.4
Keyloggers 1,
Malicious keyloggers 2,
Keyloggers other data logging 3
8  cards
Physical Attacks 2.4
Physical attacks 1,
Brute force attack 2,
Radio frequency identification rf...
5  cards
Denial of Service 2.4
Denial of service 1,
Friendly dos 2,
Ways to friendly dos 3
5  cards
DNS Poisoning 2.4
Domain name system dns 1,
Dns poisoning 2,
How a dns poisoning is perfomed 3
8  cards
Wireless Attacks 2.4
Wireless deauthentication 1,
Disassocation attacks 2,
Institute of electrical and elect...
9  cards
On-path Attacks 2.4
On path attack 1,
Access resolution protocol arp 2,
Arp message types 3
6  cards
Replay Attacks 2.4
Replay attacks 1,
Methods to perform a replay attack 2,
Pass the hash 3
10  cards
Malicious Code 2.4
Malicious code 1,
Different forms of malicious code 2
2  cards
Application Attack 2.4
Injection attack 1,
Causes for injection attack 2,
Different types of injection atta...
11  cards
Cryptographic Attacks 2.4
Birthday attack 1,
Protection against birthday attack 2,
Collision attack 3
5  cards
Password Attacks 2.4
Hashing a password 1,
Spraying attack 2,
Brute force 3
6  cards
Indicators of Compromise 2.4
Indicators of compromise ioc 1,
Common indicators 2,
Account lockout 3
14  cards
Segmentation and Access Control 2.5
Ways to segment a network 1,
Segmentation for performance 2,
Segmentation for security 3
13  cards
Mitigation Techniques 2.5
Patching 1,
Encryption 2,
Encrypted file system efs 3
17  cards
Hardening Technique 2.5
Hardening 1,
Security updates 2,
Securing user accounts 3
17  cards
Cloud Infrastructure 3.1
Responsibility matrix 1,
Hybrid cloud 2,
Considerations when using hybrid ...
5  cards
Data Types and Classifications 3.3
Regulated 1,
Trade secret 2,
Intellectual property 3
20  cards
Resiliency 3.4
High availability ha 1,
Cost of high availability 2,
Server clustering 3
3  cards
Recovery Testing 3.4
Recovery testing 1,
Fail over test 2,
Ways to ensure failure and redund...
6  cards
Hardening Targets 4.1
Hardening 1,
Hardening guides 2,
Hardening of mobile devices 3
17  cards
Vulnerability Remediation 4.3
Patching 1,
Schedule of patches 2,
Unscheduled patch 3
20  cards
Firewalls 4.5
Network based firewalls 1,
Next generation firewall ngfw 2,
Open systems interconnection osi ...
10  cards
Web Filtering 4.5
Content filtering 1,
What is managed by content filter...,
Url scanning 3
15  cards
Access Control 4.6
Access control 1,
Authorization 2,
Least privilege 3
10  cards
Multi-factor Authentication 4.6
Multi factor authentication facto...,
Examples of something you know 2,
Examples of something you have 3
4  cards
Incident Planning 4.8
Table top exercise 1,
Simulation 2,
Root cause analysis 3
8  cards
Log Data 4.9
Security log files 1,
Information stored on security lo...,
Firewall logs 3
16  cards
Security Policies 5.1
High level strategy for security ...,
Detailed security goals 2,
Primary focus of security policies 3
24  cards
Data and Responsibilities 5.1
Data owner 1,
Data controller 2,
Data processor 3
3  cards
Risk Analysis 5.2
Qualitative risk assessment 1,
Quantitative risk assessment 2,
Annualized rate of occurrence aro 3
17  cards
Business Analysis Impact 5.2
Recovery time objective rto 1,
Recovery point objective rpo 2,
Mean time to repair mttr 3
5  cards
Agreement Types 5.3
Service level agreement sla 1,
Memorandum of understanding mou 2,
Memorandum of agreement moa 3
10  cards
Compliance 5.4
Compliance 1,
Scope of compliance laws 2,
Internal compliance requirements 3
22  cards
Penetration Testing 5.5
Physical penetration test 1,
Red team 2,
Blue team 3
9  cards

More about
Security Comp TIA 701

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Dominic Asio's Security Comp TIA 701 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Comp TIA Security +
  • 3 decks
  • 254 flashcards
  • 10 learners
Decks: Practice Study 1, Practice Study 2, Practice Study 3, And more!
CompTIA Security+ (SY0-701)
  • 30 decks
  • 918 flashcards
  • 316 learners
Decks: Acronym List A D, Acronym E M, Acronym N T, And more!
CompTIA A+
  • 28 decks
  • 3865 flashcards
  • 728 learners
Decks: Chapter 1 Mobile Devices Mc, Chapter 1 Mobile Devices, Chapter 1 Mobile Devices Key Terms, And more!
Com TIA Security+
  • 13 decks
  • 386 flashcards
  • 3 learners
Decks: Fundamentals Of Security, 2nd Part, 3rd Part From Audits And Assessments, And more!
Make Flashcards