Security+ Continuation

This class was created by Brainscape user Wisdom Eke. Visit their profile to learn more about the creator.

Decks in this class (15)

3.5 Given a scenario, implement secure mobile solutions.
Summarize the connection methods ...,
Cellular 2,
Wi fi 3
52  cards
3.6 Given a Scenario, apply Cybersecurity Solutions to the cloud
High availability and high availa...,
Resources policies 2,
Secret s management 3
29  cards
3.7 Given a Scenarior, Implement Identity and account management controls
Identity 1,
Identity providers idp 2,
Attributes 3
26  cards
3.8 Given a Scenarior, Implement authentication and authorization Solutions
Authentication management 1,
Password keys 2,
Password vaults 3
25  cards
3.9 Given a Scenarior, Implement Public Key Infrastructure
Public key infrastructure pki 1,
Key management 2,
Certificate authority ca 3
34  cards
4.1 Given a Scenarior, use the appropriate tool to access Organizational Security
Tracert traceroute 1,
Nslookup dig 2,
Ipconfig ifconfig 3
40  cards
4.2 Summarize the Importance of policies, Processes, and Procedures for Incident response
Incident response plans 1,
Incident response process 2,
Preparation 3
22  cards
4.3 Given an Incident, Utilize appropriate data sources to support an Investigation
Vulnerability scan output 1,
Siem dashboards 2,
Sensors 3
30  cards
4.4 Given an Incident, apply mitigation techniques or controls to secure an environment
Reconfigure endpoint security sol...,
Application approved list 2,
Application block list deny list 3
16  cards
4.5 Explain the Key aspect Of Digital Forensics
Documentation and evidence 1,
Legal hold 2,
Video 3
36  cards
5.1 Compare And Contrast Various Types Of Controls
Category 1,
Managerial 2,
Operational 3
10  cards
5.2 Explain the Importance Of applicable Regulations, Standards, Or Frameworks that Impact Organizational Security Posture.
Regulations standards and legisla...,
General data protection regulatio...,
National territory or state laws 3
18  cards
5.3 Explain the Importance Of Policies to Organizational Security
Personnel 1,
Acceptable user policy aup 2,
Job rotation 3
43  cards
5.4 Summarize risk management process and concepts
Risk types 1,
External 2,
Internal 3
45  cards
5.5 Explain Privacy and Sensitive data Concepts In relation to security
Organizational consequences of pr...,
Reputation damage 2,
Identity theft 3
37  cards

More about
Security+ Continuation

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Wisdom Eke's Security+ Continuation flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security +
  • 43 decks
  • 2139 flashcards
  • 55 learners
Decks: Fundamentals Of Security, Threat Actors, Physical Security, And more!
SEC575: Mobile Device Security
  • 5 decks
  • 49 flashcards
  • 12 learners
Decks: Dynamic Analysis, Mobile Penetration Testing, Device Architecture And App Interaction, And more!
Implementering
  • 8 decks
  • 141 flashcards
  • 6 learners
Decks: Lektion 1 Introduktion Til Faget, Lektion 2 Introduktion Til Implementatio, Lektion 3 Policy Implementering Og Top D, And more!
Make Flashcards