security comp tia 701

This class was created by Brainscape user Dominic Asio. Visit their profile to learn more about the creator.

Decks in this class (52)

Security Controls 1.1
Technical controls,
Operational controls,
Managerial controls
37  cards
THE CIA/AIC Triad 1.2
Aic triad confidentiality,
Aic triad integrity,
Aic availability
14  cards
Non-Repudiation 1.2
Describe the concept of proof of ...,
What method in cryptography is co...,
What happens to a hash if the dat...
7  cards
Authentication, Authorization, & Account 1.2
What is the first step of the aaa...,
Describe the step of authenticati...,
What is the purpose of the author...
11  cards
Gap Analysis 1.2
Describe gap analysis,
Describe the general process of g...,
What is the first step in initiat...
10  cards
Zero Trust 1.2
Describe zero trust,
Through a zero trust policy what ...,
What is the purpose of separate f...
15  cards
Physical Security 1.2
How are barricades bollards used ...,
Describe the use of access contro...,
Where are access control vestibul...
10  cards
Deception and Disruption 1.2
Describe the use of a honeypots,
Describe the application of honey...,
Describe the use of honeyfiles in...
5  cards
Change Management 1.3
What is the importance of change ...,
What are issues that can arise if...,
What is the purpose of having a f...
18  cards
Technical Change Management 1.3
Describe the technical change man...,
What are some important considera...,
What are some important considera...
16  cards
Public Key Infrastructure 1.4
Describe public key infrastructur...,
Describe a symmetric encryption,
What are the benefits in using sy...
8  cards
Encrypting Data 1.4
What is data at rest,
What is the purpose of an encrypt...,
What is the purpose of transparen...
11  cards
Key Exchange 1.4
What is the purpose of a key exch...,
How is a key exchange performed u...,
How is a key exchange performed u...
4  cards
Encyrption Technologies 1.4
Describe a trusted platform module,
Hardware security module hsm,
Cryptographic functions of the hsm
8  cards
Obfuscation 1.4
Obfuscation,
Obfuscation strategies,
Common stenography image strategies
8  cards
Hashing and Digital Signatures 1.4
Hashes,
Use of hashes,
Collision
13  cards
Blockchain Technology 1.4
Blockchain,
Applications of the blockchain,
Integrity of the blockchain
3  cards
Certificates 1.4
Digital certificate,
Public key certificate,
Adding trust
14  cards
Threat Actors 2.1
Threat actors,
Insider threats,
Medium level of sophistication fo...
14  cards
Common Threat Vector 2.2
Threat vector,
Attack vector,
Message based vectors
20  cards
Phishing 2.2
Phishing,
Business email compromise,
Typosquatting
6  cards
Impersonation 2.2
Impersonation,
Ways for impersonation,
Eliciting information
6  cards
Watering Hole Attacks 2.2
Watering hole attack,
Executing a watering hole attack,
Defense in depth
3  cards
Misinformation and Disinformation 2.2
Influence campaigns,
Misinformation process,
Brand impersonation
3  cards
Memory Injections 2.3
Dynamic link library,
Dll injection
2  cards
Buffer Overflows 2.3
Buffer overflows,
Solution for buffer overflows
2  cards
Race Condition 2.3
Race condition,
Time of check time of use attack
2  cards
Malicious Updates 2.3
1  cards
Operating System Vulnerabilities 2.3
Operating systems os,
Best practices for os vulnerabili...
2  cards
SQL Injection 2.3
Code injection,
Types code injection,
Sql injection
4  cards
Cross Site Scripting 2.3
Cross site scripting,
Non persistent xss attack,
Persistent stored xss attack
4  cards
Hardware Vulnerabilities 2.3
Internet of things iot,
Firmware,
End of life eol
8  cards
Virtualization Security 2.3
Virtual machines vm,
Hypervisor,
Vm vulnerabilities
10  cards
Cloud-Specific Vulnerabilities 2.3
Security in the cloud,
Denial of service dos,
Directory traversal
5  cards
Supply Chain Attack 2.3
Supply chain vector,
Supply chain,
Service provider vector
6  cards
Misconfiguration Vulnerabilities 2.3
Permissions,
Open permissions,
Administrative root accounts
9  cards
Mobile Device Vulnerabilities 2.3
Mobile device security,
Jailbreaking,
Rooting
5  cards
Zero-Day Vulnerabilities 2.3
Zero day,
Zero day attack
2  cards
An Overview of Malware 2.4
Malware,
Purpose of malware,
Viruses
7  cards
Virus and Worms 2.4
Viruses,
Anti virus av products,
Program virus
9  cards
Spyware and Bloatware 2.4
Spyware,
Keyloggers,
Protection against spyware
5  cards
Other Malware Types 2.4
Keyloggers,
Malicious keyloggers,
Keyloggers other data logging
8  cards
Physical Attacks 2.4
Physical attacks,
Brute force attack,
Radio frequency identification rfid
5  cards
Denial of Service 2.4
Denial of service,
Friendly dos,
Ways to friendly dos
5  cards
DNS Poisoning 2.4
Domain name system dns,
Dns poisoning,
How dns poisoning is perfomed
8  cards
Wireless Attacks 2.4
Wireless deauthentication,
Disassocation attacks,
Institute of electrical and elect...
9  cards
On-path Attacks 2.4
On path attack,
Access resolution protocol arp,
Arp message types
6  cards
Replay Attacks 2.4
Replay attacks,
Methods to perform a replay attack,
Pass the hash
10  cards
Malicious Code 2.4
Malicious code,
Different forms of malicious code
2  cards
Application Attack 2.4
Injection attack,
Causes for injection attack,
Different types of injection attack
11  cards
Cryptographic Attacks 2.4
Birthday attack,
Protection against birthday attack,
Collision attack
5  cards
Password Attacks 2.4
1  cards

More about
security comp tia 701

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Dominic Asio's Security Comp TIA 701 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Comp Tia Security +
  • 1 decks
  • 25 flashcards
  • 1 learners
Decks: Section 1 Overview Of Security, And more!
CompTIA Security+ SY0-701 Module 1:
  • 39 decks
  • 59 flashcards
  • 2 learners
Decks: Slide 1 General Security Concepts, Slide 2 Defense In Depth, Slide 3 Essential Terminology, And more!
CompTIA Network+ (N10-008)
  • 27 decks
  • 788 flashcards
  • 2800 learners
Decks: Networks Basic Concepts, Osi Model, Tcp Ip Model, And more!
Security TIA
  • 1 decks
  • 16 flashcards
  • 1 learners
Decks: The Present Threat Landscape, And more!
Make Flashcards