This class was created by Brainscape user J Odeyemi. Visit their profile to learn more about the creator.

Decks in this class (20)

Domain 1 : General Security Concepts
What is a firewall,
Security controls,
Technical controls
24  cards
Domain 1 : Security Concepts
Confidentiality,
Integrity,
Availability
42  cards
Domain 1 :Explain the importance of using appropriate cryptographic solution
Public key infrastructure pki,
Public key,
What is the public key encryption...
44  cards
Domain 2:Threats, Vulnerabilities, and Mitigations
Nation state,
Advanced persistent threat apt,
Unskilled attacker
15  cards
Domain 2 :Explain common threat vectors and attack surfaces
Sms phishing smishing,
Im vun,
Client based scanning
15  cards
Domain 2 : Explain various types of vulnerabilities
Memory injection,
Buffer overflow,
Race conditions
20  cards
Domain 2 : Given a scenario, analyze indicators of malicious activity
Potentially unwanted programs pups,
Trojans,
Remote access trojans rats
34  cards
Domain 2 : Explain the purpose of migation techinques
Segementation,
Imovement of potential attackers,
Vlan
13  cards
Domain 3 :Compare and contrast security implications of different architecture models
Public cloud,
Private cloud,
Community cloud
12  cards
Domain 3: Given a scenario, apply security principles to secure enterprise infrastructure
Device placement,
Security zone,
Single point of failure
34  cards
Domain 3:Compare and contrast concepts and strategies to protect data
Personally identifiable informati...,
Protected health information phi,
Financial data
32  cards
Domain 3 : Explain the importance of resilience and recovery in security architecture
High availability,
Least utilized host,
Dns round robin
35  cards
Domain 4 : Given a scenario, apply common security techniques to computing resources
Secure baseline,
Center for internet security cis ...,
Security technical implementation...
52  cards
Domain 4
Sellinux,
Netflow,
Snmp
30  cards
Domain 5: Summarize elements of effective security governance
Guidlines,
Policies,
Acceptable use policy
27  cards
Domain 5:Explain elements of the risk management process
Threat,
Risk,
Vulnerability
40  cards
Domain 5 :Explain the processes associated with third-party risk assessment and management
Vendor assesment,
Penetration testing,
Unknown environment
22  cards
Domain 5: Summarize elements of effective security compliance
Compliance reporting,
Internal,
Policy adherence
35  cards
Domain 5 :Given a scenario, implement security awareness practices
Social engineering,
Spoofed communication,
Anomalous behavior recognition abr
10  cards
Explain the importance of automation and orchestration related to secure operations
0  cards

More about
comptia security

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study J Odeyemi's Comptia Security flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

COMPTIA CYSA
  • 1 decks
  • 77 flashcards
  • 1 learners
Decks: General Cysa Test, And more!
CompTIA Linux+
  • 20 decks
  • 752 flashcards
  • 772 learners
Decks: 01 Introduction, 11 The Shell, 12 Help, And more!
CompTIA A+
  • 36 decks
  • 1910 flashcards
  • 7 learners
Decks: Mike Meyers Total A Certification 220 10, Jason Dion Comptia A 1001 Exam Prep 1, Jason Dion Comptia A 1001 Exam Prep 2, And more!
(3) CompTIA Security+ (SY0-601)
  • 35 decks
  • 745 flashcards
  • 16 learners
Decks: Security Overview, Malware, Malware Infections, And more!
Make Flashcards