security+ study guide 7th edition sy501

This class was created by Brainscape user Curtis Padgett. Visit their profile to learn more about the creator.

Decks in this class (13)

Risk Assessment & Mangement Terms (Ch. 1)
Agreed upon principles set forth ...,
A calculation used to identify ri...,
A calculation of how often a thre...
28  cards
Monitoring & Diagnosing Networks Terms (Ch. 2)
A network segment between two fir...,
A fake system designed to divert ...,
A broad term that applies to a wi...
8  cards
Port Numbers
Ftp data file transfer data,
Ftp control file transfer control,
Ssh secure shell also is slogin s...
34  cards
Understanding Devices and Infrastructure (Ch. 3)
A table or data file that specifi...,
The point at which access to a ne...,
A response generated in real time
41  cards
Identity and Access Management Terms (Ch. 4)
An authentication protocol that p...,
The point at which the frr and fa...,
Any technique that prevents a pro...
13  cards
Wireless Network Threat Terms (Ch. 5)
The ieee standard that defines po...,
The sending of unsolicited messag...,
The gaining of unauthorized acces...
15  cards
Securing the Cloud Terms (Ch. 6)
On premise or cloud based securit...,
Moving the execution of an applic...,
A model for enabling ubiquitous c...
21  cards
Host, Data, & Application Security (Ch. 7)
Any sophisticated series of relat...,
A method of software development ...,
Creating a fundamental or baselin...
21  cards
Cryptography Terms (Ch. 8)
Cryptographic algorithms that use...,
An authentication protocol that p...,
When two different inputs into a ...
9  cards
Threats, Attacks, and Vulnerabilities (Ch.9)
Protocol used to map known ip add...,
An attack that convinces the netw...,
Software that gathers information...
52  cards
Social Engineering and Other Foes (Ch. 10)
A control implemented through adm...,
A physical security deterrent use...,
Server room aisles that blow cold...
36  cards
Security Administration (Ch. 11)
Involves sending unsolicited mess...,
Attack that involves getting data...,
Byod
9  cards
Disaster Recovery and Incident Response (Ch. 12)
A physical site that can be used ...,
A type of backup that includes on...,
The act of recovering data follow...
23  cards

More about
security+ study guide 7th edition sy501

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Curtis Padgett's Security+ Study Guide 7th Edition SY501 flashcards for their University of Maryland-University College class now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Security+ Study Guide
  • 5 decks
  • 73 flashcards
  • 1 learners
Decks: Topic 1a Infosec Roles, Topic 1b Infosec Controls, Topic 2a Threat Actor Types And Vectors, And more!
Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
HST 7th
  • 5 decks
  • 217 flashcards
  • 17 learners
Decks: Word Parts, Concepts And Applications, Prefixes, And more!
Make Flashcards