This class was created by Brainscape user Rakim Allah. Visit their profile to learn more about the creator.

Decks in this class (21)

Chapter 11
Network hardware devices that fun...,
Switches function at the ___ layer,
___ is used to resolve ip address...
82  cards
Chapter 12
This is an encryption toolused to...,
This is an authentication service...,
Is an encryption protocol develop...
67  cards
Chapter 13
A ______ attempts to thwart or st...,
______ are the hardware or softwa...,
Controls can be implemented _____...
24  cards
Chapter 14
______ refer to the access grante...,
A _____primarily refers to the ab...,
________ are the combination of r...
26  cards
Chapter 15 Security Assessment and Testing
What are techniques to identify o...,
What scanning technique is also k...,
What scanning technique sends a p...
46  cards
Chapter 16 Managing Security Operations
What policy creates a checks and ...,
What policy grant specific proces...,
What policy applies to all public...
24  cards
Chapter 17 Preventing and Responding to Incidents
Any event that has a negative eff...,
The result of an attack or the re...,
What are the five steps involved ...
50  cards
Chapter 18 Disaster Recovery Planning
This is also called striping it u...,
This is also called striping with...,
_______ is configured astwo or mo...
40  cards
Chapter 20
The instructions that a computer ...,
A converts thehigher level langua...,
When ______ are used the programm...
49  cards
Chapter 21 Malicious Code and Application Attacks
______ store the majority oftheir...,
May slightly alter the code of an...,
_____ first appeared on the scene...
16  cards
Chapter 1 Security Governance Through Principles and Policies
Similar elements are put into gro...,
Use of multiple controls in a ser...,
The art and science of hiding the...
45  cards
Chapter 2 Personnel Security and Risk Management Concepts
________ is the collection of pra...,
Any potential occurrence that may...,
The weakness in an asset or the a...
33  cards
Chapter 3 Business Continuity Planning
The bcp process as defined by isc...,
The following are components of w...,
The following are components of w...
7  cards
Chapter 4 Laws, Regulations, and Compliance
Contains prohibitions against act...,
It is incumbent upon the person w...,
Policies procedures and regulatio...
19  cards
Chapter 5 Protecting Security of Assets
Applied to information the unauth...,
Available to anyone though it oft...,
Applied to information the unauth...
33  cards
Chapter 6 Cryptography and Symmetric Key Algorithms
To encrypt a message you simply s...,
A cryptographic system should be ...,
Random number that acts as a plac...
30  cards
Chapter 7 PKI and Cryptographic Applications
Disadvantage the algorithm double...,
Sha 1 produces a ____ bit message...,
Sha 256 produces a ___ bit messag...
41  cards
Chapter 8 Principles of Security Models, Design, and Capabilities
The user or process that makes a ...,
The ____ is the resource a user o...,
______ is the concept that if a t...
58  cards
Chapter 9 Security Vulnerabilities, Threats, and Countermeasures
Permits multiple concurrent tasks...,
Computing system harnesses the po...,
Multiple tasks occupy multiple pr...
78  cards
Chapter 10 Physical Security Requirements
The security controls implemented...,
________ is the expected typical ...,
_______ is the average length of ...
45  cards
Chapter 19
_______ may result in chargingsus...,
______ when they believe that ani...,
_______ simply requires that the ...
18  cards

More about
cybersecurity

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Rakim Allah's CyberSecurity flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Cyber Security
  • 27 decks
  • 612 flashcards
  • 7 learners
Decks: Unit 2 Module 3, Unit 2 Module 4, Unit 3 Module 1, And more!
cybersecurity
  • 22 decks
  • 560 flashcards
  • 23 learners
Decks: Google Hacks, Reconnaissance, Sniffing And Evasion, And more!
IT Cybersecurity
  • 14 decks
  • 443 flashcards
  • 61 learners
Decks: A It Essentials Quiz 1, A It Essentials Quiz 2, A It Essentials Quiz 3, And more!
Cyber Security (CompTIA Security+)
  • 41 decks
  • 1670 flashcards
  • 4 learners
Decks: Chapter 1 Threats Attacks And Vulnerabil, Chapter 11 Social Engineering, Chapter 12 Attack Types, And more!
Make Flashcards