This class was created by Brainscape user Kassandra Strong. Visit their profile to learn more about the creator.

Decks in this class (24)

1A
A ____ is any circumstance or eve...,
A threat is a __ danger that __ e...,
The model microsoft uses for thre...
37  cards
Teacher Highlights
The model microsoft uses for thre...,
What does stride stand for 2,
What is spoofing 3
70  cards
1B
__ __ is a non technical or low t...,
Social engineering is commonly kn...,
The purpose of social engineering...
11  cards
1C
__ __ is software or scripts writ...,
Malicious code includes a broad c...,
____ is software designed to infi...
47  cards
1D
A __ __ consists of multiple enti...,
A __ __ in a supply chain is an i...,
Third party support services can ...
8  cards
2A
What does nac stand for 1,
___ is a wired and wireless netwo...,
Any system not meeting nac condit...
25  cards
2B
Systems that provide centralizati...,
Together these make up the first ...,
__ means presenting information a...
14  cards
2C
A system or network can be thorou...,
What does sdlc stand for 2,
The development process of an app...
37  cards
2D
The basic input output system bio...,
__ __ has the system digitally si...,
Universal serial bus usb flash dr...
28  cards
3A
__ are critical as a form of cybe...,
Firewalls accomplish this by moni...,
Firewalls can be implemented as h...
62  cards
4A
Firewalls allow a network adminis...,
When creating your firewall plan ...,
The following describes which sec...
18  cards
5A
The incident response policy is d...,
The incident response policy spec...,
Reporting accurate incident infor...
35  cards
5B
The primary goal of the _ __ is t...,
There are six steps taken in resp...,
The six steps taken in response t...
9  cards
Kahoots
What involves psychological manip...,
True or false a targeted social e...,
True or false cybersecurity in th...
91  cards
5C
As previously explained in object...,
In accordance with ____ the cyber...,
What are the five steps to a root...
13  cards
6A
Cybersecurity experts estimate th...,
__ __ refers to the practices and...,
___ monitor data packets passing ...
17  cards
6C
The baseline configuration is the...,
This baseline is originally creat...,
____ is the measuring of a system...
8  cards
6D
__ __ is the process for maintain...,
____ can lead to poor performance...,
When undocumented changes occur a...
11  cards
6E
__ and __ refer to the process of...,
Backing up data requires __ and _...,
Data from an earlier time can onl...
47  cards
7A
__ __ compliance ensures appropri...,
The focus of compusec is on end p...,
The compusec objective is to empl...
35  cards
7B
What does tempest stand for 1,
Formerly called emissions securit...,
Tempest vulnerabilities come from...
14  cards
7C
___ is a subset of the air force ...,
What does ip stand for 2,
Information protection consists o...
64  cards
7D
The purpose of __ __ opsec is to ...,
Opsec is a process of identifying...,
Opsec is the responsibility of __...
8  cards
7E
Communications security comsec is...,
The objective of the _____ progra...,
What does comsec stand for 3
15  cards

More about
Block 5 - Cyber Security

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Kassandra Strong's Block 5 - Cyber Security flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Cyber Security
  • 19 decks
  • 2738 flashcards
  • 137 learners
Decks: Security Risk Management Srm, Security Assessment And Testing Ant, Software Development Security Dev, And more!
CompTIA Security +
  • 43 decks
  • 2139 flashcards
  • 55 learners
Decks: Fundamentals Of Security, Threat Actors, Physical Security, And more!
Make Flashcards