Learn Network Engineering
Study Network Engineering using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
Sec+ -> 1.0 Attacks, Threats, and Vulnerabilities (24%)
Sec+ -> 1.0 Attacks, Threats, and Vulnerabilities (24%)
By: Isabelle S
1.1 - Compare and contrast different types of social engineering techniques., 1.2 - Given a scenario, analyze potential indicators to determine the type of attack., 1.3 -Given a scenario, analyze potential indicators associated with application attacks....8Decks295Flashcards2Learners -
SEC+ 601
SEC+ 601
By: Duc Phan
1.1: Compare and contrast different types of social engineering techniques. , 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks....9Decks222Flashcards1Learner -
Biochemistry 1
Biochemistry 1
By: Jose Ting
Amino Acids, Protein Structure, Folding, Proteostasis (L2,3), Structural & Molecular Basis of Drug Action (L4,5)...18Decks362Flashcards2Learners -
Sec+
Sec+
By: GiGi C.
1.1 social engineering techniques, 1.2 analyze potential indicators to determine the type of attack, 1.3 potential indicators associated with application attacks...38Decks387Flashcards1Learner -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks....40Decks663Flashcards1Learner -
CISSP 2017
CISSP 2017
By: M Fox
Security and Risk Management 16%, Asset Security 10%, Security Engineering 12%...9Decks43Flashcards5Learners -
Security+ Study Pts
Security+ Study Pts
By: Carmen Menéndez
X- Security+ Exam 411, 1- Mastering the Basics, 2- Exploring Control Types/ Methods...12Decks124Flashcards3Learners -
Threats, Attacks, Vulneraries
Threats, Attacks, Vulneraries
By: I J
Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack, 1.3 Given a scenario, analyze potential indicators associated with application attacks...8Decks205Flashcards1Learner -
A+ Technical Training
A+ Technical Training
By: Mark Straley
Chapter 1: Operational Procedures, Chapter 2: Planning and Professionalism, Chapter 3: Operating System Fundamentals...22Decks120Flashcards3Learners -
CISSP
CISSP
By: James Hatton
Domain 1 - Security and Risk Management, Domain 2 - Asset Security, Domain 3 - Security Engineering...8Decks159Flashcards2Learners -
Comptia A+ Core 2
Comptia A+ Core 2
By: Andrew Dieppa
1.1 An Overview of Windows, 1.1 - Windows Features, 1.1 - Windows Upgrades...69Decks528Flashcards1Learner -
CISSP
CISSP
By: manche bajra
Domain1: laws Regulations & Compliance and investigations, Domain #2: Asset Security, Domain 3: Security Architecture and Engineering...8Decks97Flashcards3Learners -
Sy0-601: 1.0 Threats, Attacks, and Vulnerabilities
Sy0-601: 1.0 Threats, Attacks, and Vulnerabilities
By: Christopher Robbins
1.1 Compare and contrast different types of social engineering techniques, 1.2 Given a scenario, analyze potential indicators to determine the type of attack, 1.3 Given a scenario, analyze potential indicators assoicated with application attacks...8Decks179Flashcards2Learners -
Computer science 6A
Computer science 6A
By: Unknown Unknown
Software Engineering - Design Methods and Strategies, Lifecycle of Software Development, Software Development...9Decks80Flashcards1Learner -
Network
Network
By: Leroy Reynolds
IPv4 Classes, Wireless Standard, Malware Types...8Decks142Flashcards1Learner -
Sec+
Sec+
By: Nicholas Diaz
Security+ nmap command prompts, Network+, Sec+ Acronyms...9Decks184Flashcards1Learner -
Old - A2 Computing
Old - A2 Computing
By: Matthew Stratford
Operating Systems, Software Eng, Networks...8Decks57Flashcards2Learners -
Security+ Comp TIA
Security+ Comp TIA
By: Dominic Asio
Chapter 1 Social Engineering Techniques, Chapter 2 Type of Attack Indicators, Chapter 3 Application Attack Indicators...5Decks124Flashcards1Learner -
COMP SCI
COMP SCI
By: Unknown Unknown
Overview, External Threats I: Social Engineering & Denial of Service, External Threats Part II: Backdoor Mechanisms, IP Spoofing, and MITM Attacks...15Decks145Flashcards1Learner -
CompTIA Security+ (SY0-701)
CompTIA Security+ (SY0-701)
By: John Vargas
General Security Concepts: Examine Security Controls Category, General Security Concepts: Examine Security Control Types, General Security Concepts: Examine the Principle of Security...122Decks1,638Flashcards65Learners -
1.0 Threats, Attacks, and Vulnerabilities
1.0 Threats, Attacks, and Vulnerabilities
By: Justin Doring
1.1 Compare and contrast different types of social engineering techniques, 1.2 Analyze potential indicators to determine the type of attack, 1.3 Analyze potential indicators associated with application attacks...8Decks206Flashcards1Learner -
CSC2004: Cyber Security Fundamentals
CSC2004: Cyber Security Fundamentals
By: Jun Xian Lim
Summary: Lecture 13, Intro to Cryptography & Asymmetric Cryptography: Lecture 1, Access Control: Lecture 2...11Decks56Flashcards2Learners -
GCP - PCA -Architecture1
GCP - PCA -Architecture1
By: Andre White
Regions & Zones, Compute, Instance Groups...34Decks106Flashcards1Learner -
Cyber Security
Cyber Security
By: Aiden Beck
Risk Management, Internet Of Things, Pen Testing...19Decks86Flashcards2Learners -
Computer Science
Computer Science
By: Ayemwosa Osawe
Chapter 1 - Processor Components (1.1), Chapter 2 - Processor Performance (1.1), Chapter 3 - Types of Processor (1.1)...32Decks219Flashcards3Learners -
Soft Matter
Soft Matter
By: Sara Nilsson
Hydrogels, Hydrogel network engineering, Switching polymers...11Decks105Flashcards1Learner -
Computer Science Paper two stuff
Computer Science Paper two stuff
By: gusy edwards
The Computer System's Architecture, Embedded Systems, Memory...11Decks89Flashcards1Learner -
CompTIA Security+
CompTIA Security+
By: Beth Hosek
1A: Compare and Contrast Information Security Roles, 1B: Compare and Contrast Security Control and Framework Types, 2A: Explain Threat Actor Types and Attack Vectors...61Decks103Flashcards3Learners -
COMP Midterm - Oct 23
COMP Midterm - Oct 23
By: Matt Eppich
Html, Search Engines, History...7Decks60Flashcards1Learner -
CISSP
CISSP
By: Sunanda Rani
Security and Risk Management, Asset Security, Security Architecture and Engineering...9Decks215Flashcards1Learner