This class was created by Brainscape user Nicholas Piersimoni. Visit their profile to learn more about the creator.

Decks in this class (24)

(1)CyberSecurity Objectives
What are the three objectives of ...,
In the cia triad describe confide...,
In the cia triad describe integri...
5  cards
(1)Privacy Vs. Security
How does privacy differ from secu...,
Other than protecting the securit...,
There is an important concept to ...
7  cards
(1)Evaluating Security Risks
What is so important about cybers...,
What does a well constructed cybe...,
What are three terms that a risk ...
12  cards
(1)Identify Threats
How do organizations start their ...,
What four categories of threats d...,
What are adversarial threats
13  cards
(1)Identify Vulnerabilities
After threat identification what ...,
After threats and vulnerabilities...,
When factoring in the likelihood ...
7  cards
(1) Controls Review
What do cybersecurity professiona...,
What are technical controls
6  cards
(1)Secure Network Construction
What do network access control na...,
What is the 8021x protocol what a...,
In the 802 1x protocol what is a ...
9  cards
(1) Firewalls and Securing the Outer Edges of the Network
Where do network firewalls reside...,
Where does network access control...,
If a firewall is triple homed wha...
13  cards
(1)Common TCP Ports
What port does file transfer prot...,
What port does secure shell ssh use,
What port does telnet use
17  cards
(1)Segmentation of Networks
Firewalls use network segmentatio...,
When it comes to network segmenta...,
If you had a server that had secu...
6  cards
(1)Defense Through Deception
What are honeypots,
What are honeypots used for,
What are dns sinkholes
5  cards
(1) Secure Endpoint Management
What is a very important way that...,
When a system admin hardens a con...,
What is patch management
8  cards
(1)Penetration Testing
What is penetration testing,
When conducting a penetration tes...,
Who conducts penetration tests
7  cards
(1) Planning a Pentest
What are the three critical compo...,
Within the components of a planne...,
Within the components of a planne...
4  cards
(1) Pentest (Conducting Discovery and execution)
What do pentesters do during the ...,
When conducting discovery what ou...,
What do pentesters do during the ...
9  cards
(1)Pentest Review/Alternatives to Pentests
What happens after a pentest is done,
Why is the pentest report so impo...,
Other than basic information abou...
8  cards
(1)Reverse Engineering
What is reverse engineering,
What do security professionals us...,
What is one of the most dangerous...
8  cards
(1) Software/Hardware of Reverse Engineering
How do analysts that are trying t...,
How does a reverse engineer deter...,
Compared to software engineering ...
3  cards
(1) Reverse Engineering of Hardware
1  cards
(1)Efficiency and the improvement of processes
What do very well run cybersecuri...,
What is the importance of standar...,
Once a standardized process is in...
6  cards
(1)Tools and Tech and their Integrations
What are two ways that companies ...,
How can application programming i...,
What are webhooks
5  cards
(1)Efficiency ideas in Incident Response Processes
What are three normal parts of th...,
Are there possibilities to bring ...,
How can information security team...
5  cards
(2) Concepts of the Design of Infrastructure
What is serverless computing,
What are the advantages of server...,
What is virtualization
12  cards
(2)Concepts of Operating Systems
0  cards

More about
cysa+ cs0-003

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Nicholas Piersimoni's CySA+ CS0-003 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Make Flashcards