This class was created by Brainscape user lshan x. Visit their profile to learn more about the creator.

Decks in this class (73)

Threat Model
Get all-round knowledge on base level Threat Models in order to advance to more sophisticated ones.
6  cards
First Look Into Computer Parts And Tools
First chapter things?
32  cards
Computer Parts and Tools ( Part 2)
More words
25  cards
Working Inside Desktop Computers and Laptops
Chapter 2
6  cards
All About MotherBoards
Chapter 3
30  cards
All About Motherboards ( Part 2)
More chapter 3 stuff
6  cards
Review
Made up of a large aluminum block...,
Your motherboard supports triple ...,
Which memory module has 240 pins ...
25  cards
More review
Which raid level stripes data acr...,
In a magnetic hard drive data is ...,
Which type of tape cartirdge can ...
24  cards
More Review Part 2
What is the correct term for the ...,
Best described as the number of p...,
Which of the following ports has ...
25  cards
Review : Review
Which of the following ports has ...,
Which type of video port supports...,
What command do you use to find o...
20  cards
Chapter 5 Homework
Learn?
30  cards
Intro to Networking
Pass Pass
18  cards
Intro to Networking 2
Grades around average
14  cards
Intro to Networkig 3
After making configuration change...,
What function does pressing the t...,
What layer is responsible for rou...
9  cards
Intro to Networking 4
Under which two circumstances wil...,
Which switching method has the lo...,
Which two commands can be used on...
13  cards
Intro To Networking 5
What is one difference between th...,
What is the function of the http ...,
Which networking model is being u...
9  cards
Basics Of Device Driver Types
The directory on a linux machine ...,
Dev is a very interesting directo...,
An example of the printer driver ...
17  cards
Features of a Linux system
Its free,
Most of the applications and prog...,
Its open source
17  cards
Basics
Kernel,
Unifying file systems,
Hierarchical tree
9  cards
The Command Line
The command line,
Graphical interface missing,
Shell bash
3  cards
Managing Rights
Each file or directory has specif...,
Three types of rights can be comb...
2  cards
Advance Networking
The network infrastructure contai...,
End devices,
Intermediary network devices
8  cards
The Linux Directory
The root directory,
Bin essential user binaries,
Boot static boot files
21  cards
Introduction to Security
-Describe the challenges of securing information. -Define information security and explain why it is important. -Identify the types of attackers that are common today. -List the basic steps of an attack. -Describe the five basic principles of defense.
24  cards
Linux Module 2
What is the default shell in linu...,
What equivalent to the man comman...,
What command can you use to safel...
20  cards
Linux Module 3
A directory is a type of file tru...,
Which command would a user type o...,
Which of the following is an abso...
20  cards
Linux Module 4
A symbolic link is also known as ...,
What was created to define a stan...,
There is no real difference betwe...
21  cards
Security Module 3
Which vulnerability does an attac...,
Which of the following cookies is...,
How does a heap spray differ from...
20  cards
Security Module 4
Which of the following is not an ...,
Fuzzing inputs random data into a...,
Seismic sensors are used for whic...
20  cards
Security Module 5
What is a benefit of using a comb...,
Which solution is ideal for encry...,
Ntruencrypt is based on which cry...
20  cards
Security Module 6
Where are private keys not stored,
A hierarchical trust model signs ...,
How does an attacker successfully...
20  cards
Security Module 9
How does the initialization vecto...,
What is common in wep encryption ...,
Why would an administrator disabl...
19  cards
Security Module 10
Why would a user purchase a porta...,
How does google andriod software ...,
Where did qr codes originally com...
20  cards
Linux Module 5 : Interactive Quiz
Which of the following commands c...,
After a partition on a hard disk ...,
You want to see the filesystems t...
20  cards
Security Module 11
What does using least privilege m...,
On windows systems a security ide...,
Which of the following directory ...
20  cards
Security+ Random Questions 1
Which of the following statements...,
You work as a network administrat...,
Which of the following choices he...
29  cards
Security+ Random Questions 2
Ipv6 in addition to having more b...,
Which of the following actions sh...,
You are concerned about outside a...
40  cards
Security+ Random Questions 3
What is an administrative means t...,
Which of the following methods pr...,
Which device is used to connect v...
17  cards
CompTia Security + Post-Assessment
When a user suspects their comput...,
Which of the following is not an ...,
Wpa authentication uses
15  cards
Post-Assessment 2
Which of the following choices be...,
A _________ acts as separate netw...,
Which of the following is not tru...
15  cards
Post Assessment 3
An employee wants wireless access...,
An example of coding standard is ...,
Which of the following is an auth...
15  cards
Post-Assessment 4
A bluetooth device can transmit _...,
Wps pins can be cracked in less t...,
A version of the email scam that ...
15  cards
Post-Assessment 5
How long does it take to crack we...,
Which type of control in intended...,
A secret combination of letters t...
14  cards
Post-Assessment 6
Which of the following is not a p...,
Which encryption algorithm cannot...,
Which user access control model d...
18  cards
Linux+ Midterm 1
Open source software is freely de...,
Linux is merely one product of op...,
Each computer participating on th...
15  cards
Linux+ Midterm 2
To prevent a file from being clea...,
You are limited to using one pipe...,
Any command that can be executed ...
15  cards
Linux Midterm 3
Most files on a linux system that...,
To view a list of files and their...,
The ____ symbol indicates a linke...
15  cards
Security Module 2
What would be considered best pra...,
What type of malicious traffic is...,
You notice slow network speeds ac...
20  cards
Security Module 7
Which of the followig is a limita...,
How does imap store its emails,
Which technology provides efficie...
20  cards
Security Module 8
Which of the following is designe...,
Why will ipv6 eventually replace ...,
Which of the following is a defen...
20  cards
Security Module 12
Which of the following does not t...,
Which of the following is a secur...,
How do keystroke dynamics determi...
20  cards
Ethical Hacking 1
What term describes the hiding of...,
An wonders confidence that a syst...,
What different attacks might be u...
20  cards
Ethical Hacking 1 Quiz
What term is also used to describ...,
Which attack approach to ethical ...,
In the conclusion phase of an eth...
10  cards
Ethical Hacking 2
When using nslookup you must type...,
Which dns tool uses a technique t...,
What type of information gatherin...
20  cards
Memory
You can extend the duration of st...,
The process of repeating informat...,
Processing information into the m...
19  cards
Ethical Hacking 3
Which unix tool can be used to de...,
What can the ike scan utility be ...,
You have just deployed a new set ...
20  cards
Ethical hacking 4
What statement regarding a null s...,
As part of securing a host from n...,
Your client has asked you to depl...
20  cards
Linux 8
Which command can be used to fine...,
Which of the following statements...,
Which directory stores most unix ...
20  cards
Ethical Hacking 5
What does the netbios auditing to...,
After compromising a server you w...,
Which type of attack is a combina...
20  cards
Ethical Hacking 6
Which penetration testing tool ca...,
What compiler can be used in conj...,
What type of penetration testing ...
20  cards
Ethical Hacking 7
Trojans are known to use specific...,
Which of the following is not a t...,
Which tool used by trojan creator...
20  cards
Ethical Hacking 8
A client has brought to you sever...,
Which of the following is not an ...,
Which virus was specifically desi...
20  cards
Ethical Hacking 9
What is the arp method of detecti...,
Which arp poisoning tools can be ...,
Your consulting company has been ...
20  cards
Ethical Hacking 10
Which method of preventing an ins...,
In which social engineering techn...,
Which of the following statements...
23  cards
Linux module 9
Which command entered without arg...,
Where are individual user tasks s...,
Which process will always have a ...
19  cards
Linux Module 10
The process of sending print jobs...,
You can clear a log file simply b...,
When a printer is disabled
20  cards
Chapter 9 Quiz
Which method used to detect sniff...,
Which arp poisoning tools can be ...,
What type of network and method c...
10  cards
Linux Module 11
Most source code is available on ...,
Which dump level indicates a full...,
Which filename extension indicate...
20  cards
Ethical 11
When a ddos attack starts which f...,
A client has asked you for assist...,
A clients web host is currently e...
20  cards
Ethical Hacking 12a
At what layer do routers allow th...,
What does an attacker have to pre...,
A client has asked you to evaluat...
20  cards
Linux 12
A subnet mask is used to differen...,
Which windows program is often us...,
Standalone daemons are started on...
20  cards
Ethical 12b
Which antiphishing tool is an ent...,
Besides using decimal ip addresse...,
What two online services can be u...
20  cards
Identify File Types
D,
L
7  cards

More about
cybersecurity

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study lshan x's Cybersecurity flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

cybersecurity
  • 22 decks
  • 560 flashcards
  • 23 learners
Decks: Google Hacks, Reconnaissance, Sniffing And Evasion, And more!
Cyber Security
  • 27 decks
  • 612 flashcards
  • 8 learners
Decks: Unit 2 Module 3, Unit 2 Module 4, Unit 3 Module 1, And more!
Cyber Security (CompTIA Security+)
  • 41 decks
  • 1670 flashcards
  • 4 learners
Decks: Chapter 1 Threats Attacks And Vulnerabil, Chapter 11 Social Engineering, Chapter 12 Attack Types, And more!
IT Cybersecurity
  • 14 decks
  • 443 flashcards
  • 63 learners
Decks: A It Essentials Quiz 1, A It Essentials Quiz 2, A It Essentials Quiz 3, And more!
Make Flashcards