Security+ Continuation

This class was created by Brainscape user Wisdom Eke. Visit their profile to learn more about the creator.

Decks in this class (15)

3.5 Given a scenario, implement secure mobile solutions.
Summarize the connection methods ...,
Cellular,
Wi fi
52  cards
3.6 Given a Scenario, apply Cybersecurity Solutions to the cloud
High availability and high availa...,
Resources policies,
Secret s management
29  cards
3.7 Given a Scenarior, Implement Identity and account management controls
Identity,
Identity providers idp,
Attributes
26  cards
3.8 Given a Scenarior, Implement authentication and authorization Solutions
Authentication management,
Password keys,
Password vaults
25  cards
3.9 Given a Scenarior, Implement Public Key Infrastructure
Public key infrastructure pki,
Key management,
Certificate authority ca
34  cards
4.1 Given a Scenarior, use the appropriate tool to access Organizational Security
Check,
Nslookup dig,
Ipconfig ifconfig
40  cards
4.2 Summarize the Importance of policies, Processes, and Procedures for Incident response
Incident response plans,
Incident response process,
Preparation
22  cards
4.3 Given an Incident, Utilize appropriate data sources to support an Investigation
Vulnerability scan output,
Siemens dashboards,
Sensors
30  cards
4.4 Given an Incident, apply mitigation techniques or controls to secure an environment
Reconfigure endpoint security sol...,
Application approved list,
Application block list deny list
16  cards
4.5 Explain the Key aspect Of Digital Forensics
Documentation and evidence,
Legal hold,
Video
36  cards
5.1 Compare And Contrast Various Types Of Controls
Category,
Managerial,
Operational
10  cards
5.2 Explain the Importance Of applicable Regulations, Standards, Or Frameworks that Impact Organizational Security Posture.
Regulations standards and legisla...,
General data protection regulatio...,
National territory or state laws
18  cards
5.3 Explain the Importance Of Policies to Organizational Security
Personnel,
Acceptable user policy aup,
Job rotation
43  cards
5.4 Summarize risk management process and concepts
Risk types,
External,
Internal
45  cards
5.5 Explain Privacy and Sensitive data Concepts In relation to security
Organizational consequences of pr...,
Reputation damage,
Identity theft
37  cards

More about
Security+ Continuation

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Wisdom Eke's Security+ Continuation flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
O365 Mobility and Security
  • 4 decks
  • 70 flashcards
  • 4 learners
Decks: Implement Modern Device Services, Planning And Managing Device And App Com, Planning For M365 Windows 10 Deployment, And more!
AICP - Plan Making & Implementation
  • 15 decks
  • 163 flashcards
  • 15 learners
Decks: Lesson 2 Data Collection, Lesson 3 Quantitative Analysis Statistic, Lesson 4 Quantitative Analysis Populatio, And more!
Make Flashcards