comptia security + (sy0-701)

This class was created by Brainscape user Amreek Paul. Visit their profile to learn more about the creator.

Decks in this class (102)

Section 2.4 Fundamentals of Security
Objectives 1.1 Compare and contrast various types of security controls Objectives 1.2 - Summarise fundamental security concepts
0  cards
Section 2.5 Threats and Vulnerabilities
Objectives 1.1 Compare and contrast various types of security controls Objectives 1.2 - Summarise fundamental security concepts
3  cards
Section 2.6 Confidentiality
Objectives 1.1 Compare and contrast various types of security controls Objectives 1.2 - Summarise fundamental security concepts
3  cards
Section 2.7 Integrity
Objectives 1.1 Compare and contrast various types of security controls Objectives 1.2 - Summarise fundamental security concepts
3  cards
Section 2.8 Availability
Availability footnotesection 2 fu...,
3 main reasonswhy is availability...,
When hear availabity you must thi...
5  cards
Section 2.9 Non-Repudiation
Objectives 1.1 Compare and contrast various types of security controls Objectives 1.2 - Summarise fundamental security concepts
4  cards
Section 2.10 Authentication
Objectives 1.1 Compare and contrast various types of security controls Objectives 1.2 - Summarise fundamental security concepts
4  cards
Section 2.11 Autorisation
Objectives 1.1 Compare and contrast various types of security controls Objectives 1.2 - Summarise fundamental security concepts
2  cards
Section 2.12 Accounting
Objectives 1.1 Compare and contrast various types of security controls Objectives 1.2 - Summarise fundamental security concepts
3  cards
Section 2.13 Security control categories
Objectives 1.1 Compare and contrast various types of security controls Objectives 1.2 - Summarise fundamental security concepts
1  cards
Section 2.14 Security control types
Objectives 1.1 Compare and contrast various types of security controls Objectives 1.2 - Summarise fundamental security concepts
1  cards
Section 2.15 Gap Analysis
Gap analysis,
Why is conducting gap analysis im...,
How to conduct one 4 breif steps ...
5  cards
Section 2.16 Zero Trust
Zero trust,
To create a zero trust architectu...,
4 key elementscontrol plane elements
5  cards
Section 3.18 Threat Actor
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
4  cards
Section 3.19 Threat Actor Attributes
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
3  cards
Section 3.20 Unskilled Attackers
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
3  cards
Section 3.21 Hacktivists
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
6  cards
Section 3.22 Organised Crime
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
5  cards
Section 3.23 Nation State Actor
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
7  cards
Section 3.24 Insider Threats
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
4  cards
Section 3.25 Shadow IT
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
3  cards
Section 3.26 Threat Vectors and Attack Surfaces
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
9  cards
Section 3.27 Outsmarting Threat Actors
Objectives 1.2 Summarise fundamental security concepts Objectives 2.1 Compare and contrast threat actors and motivations Objectives 2.2 Explain common threat vectors and attack surfaces
8  cards
Section 4.29 Fencing and Bollards
Objectives 1.2 Summarise fundamental security concepts Objectives 2.4 Analyse indicators of malicious activity
4  cards
Section 4.30 Attacking with Brute Force
Objectives 1.2 Summarise fundamental security conceptsObjectives 2.4 Analyse indicators of malicious activity
4  cards
Section 4.31 Surveillance Systems
Objectives 1.2 Summarise fundamental security concepts Objectives 2.4 Analyse indicators of malicious activity
6  cards
Section 4.32 Bypassing Surveillance Systems
Objectives 1.2 Summarise fundamental security concepts Objectives 2.4 Analyse indicators of malicious activity
6  cards
Section 4.33 Access Control Vestibule's
Objectives 1.2 Summarise fundamental security concepts Objectives 2.4 Analyse indicators of malicious activity
5  cards
Section 4.34 Door Locks
Objectives 1.2 Summarise fundamental security concepts Objectives 2.4 Analyse indicators of malicious activity
4  cards
Section 4.35 Access Badge cloning
Objectives 1.2 Summarise fundamental security concepts Objectives 2.4 Analyse indicators of malicious activity
3  cards
Section 5.37 Social Engineering Motivation Triggers
Objectives 2.2 Explain common threat vectors and attack surfaces Objectives 5.6 Given a scenario, implement security awareness practices
8  cards
Section 5.38 Impersonation
Objectives 2.2 Explain common threat vectors and attack surfaces Objectives 5.6 Given a scenario, implement security awareness practices
5  cards
Section 5.39 Pretexting
Objectives 2.2 Explain common threat vectors and attack surfaces Objectives 5.6 Given a scenario, implement security awareness practices
1  cards
Section 5.40 Phishing Attacks
Objectives 2.2 Explain common threat vectors and attack surfaces Objectives 5.6 Given a scenario, implement security awareness practices
7  cards
Section 5.41 Preventing Phishing Attacks
Objectives 2.2 Explain common threat vectors and attack surfaces Objectives 5.6 Given a scenario, implement security awareness practices
6  cards
Section 5.42 Conducting an Anti-Phishing attack
Objectives 2.2 Explain common threat vectors and attack surfaces Objectives 5.6 Given a scenario, implement security awareness practices
1  cards
Section 5.43 Frauds and Scams
Objectives 2.2 Explain common threat vectors and attack surfaces Objectives 5.6 Given a scenario, implement security awareness practices
6  cards
Section 5.44 Influence Campaigns
Objectives 2.2 Explain common threat vectors and attack surfaces Objectives 5.6 Given a scenario, implement security awareness practices
3  cards
Section 5.45 Other Social Engineering Attacks
Objectives 2.2 Explain common threat vectors and attack surfaces Objectives 5.6 Given a scenario, implement security awareness practices
9  cards
Section 6.46 Malware
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
3  cards
Section 6.47 Viruses
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
11  cards
Section 6.48 Worms
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
3  cards
Section 6.49 Trojans
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
2  cards
Section 6.51 Ransomware
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
4  cards
Section 6.52 Zombies and Botnets
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
5  cards
Section 6.53 Rootkits
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
9  cards
Section 6.54 Backdoors and Logic Bombs
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
3  cards
Section 6.55 Keylogger
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
4  cards
Section 6.56 Spyware and Bloatware
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
5  cards
Section 6.57 Malware Attack Techniques
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
10  cards
Section 6.58 Indications of Malware attacks
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
9  cards
Section 7.60 Data Protection and Classifications
Objectives 14 Explain the importance of using appropriate cryptographic solutions. Objectives 3.3 Compare and contrast strategies to protect data. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management. Objectives 4.4 Explain security alerting, monitoring concepts and tools. Objectives 5.1 Summarise elements of effective security governance.
8  cards
Section 7.61 Data Ownership
Objectives 14 Explain the importance of using appropriate cryptographic solutions. Objectives 3.3 Compare and contrast strategies to protect data. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management. Objectives 4.4 Explain security alerting, monitoring concepts and tools. Objectives 5.1 Summarise elements of effective security governance.
9  cards
Section 7.62 Data States
Objectives 14 Explain the importance of using appropriate cryptographic solutions. Objectives 3.3 Compare and contrast strategies to protect data. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management. Objectives 4.4 Explain security alerting, monitoring concepts and tools. Objectives 5.1 Summarise elements of effective security governance.
6  cards
Section 7.63 Data Types
Objectives 14 Explain the importance of using appropriate cryptographic solutions. Objectives 3.3 Compare and contrast strategies to protect data. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management. Objectives 4.4 Explain security alerting, monitoring concepts and tools. Objectives 5.1 Summarise elements of effective security governance.
9  cards
Section 7.64 Data Sovereignty
Objectives 14 Explain the importance of using appropriate cryptographic solutions. Objectives 3.3 Compare and contrast strategies to protect data. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management. Objectives 4.4 Explain security alerting, monitoring concepts and tools. Objectives 5.1 Summarise elements of effective security governance.
4  cards
Section 7.65 Securing Data
Objectives 14 Explain the importance of using appropriate cryptographic solutions. Objectives 3.3 Compare and contrast strategies to protect data. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management. Objectives 4.4 Explain security alerting, monitoring concepts and tools. Objectives 5.1 Summarise elements of effective security governance.
8  cards
Section 7.66 Data Loss Prevention (DLP)
Objectives 14 Explain the importance of using appropriate cryptographic solutions. Objectives 3.3 Compare and contrast strategies to protect data. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management. Objectives 4.4 Explain security alerting, monitoring concepts and tools. Objectives 5.1 Summarise elements of effective security governance.
5  cards
Section 8.68 Cryptographic Solutions: Symmetric v Asymmetric
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyze indicators of malicious activity
5  cards
Section 8.69 Symmetric vs Asymmetric
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity
5  cards
Section 8.70 Symmetric Algorithms
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity
7  cards
Section 8.71 Asymmetric Algorithms
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.
7  cards
Section 8.72 Hashing
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.
9  cards
Section 8.73 Increasing Hash Security
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.
6  cards
Section 8.74 Public Key Infrastructure (PKI)
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.
4  cards
Section 8.75 Digital Certificates
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.
18  cards
Section 8.77 Blockchain
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.
7  cards
Section 8.78 Encryption Tools
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.
5  cards
Section 8.79 Obfuscation
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.
3  cards
Section 8.80 Cryptographic Attacks
Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.
10  cards
Section 9.81 Risk Management
Objective 5.2: Explain elements of the risk management process
6  cards
Section 9.82 Risk Assessment Frequency
Objective 5.2: Explain elements of the risk management process
6  cards
Section 9.83 Risk Identification
Objective 5.2: Explain elements of the risk management process
7  cards
Section 9.84 Risk Register
Objective 5.2: Explain elements of the risk management process
12  cards
Section 9.85 Qualitative Risk Analysis
Objective 5.2: Explain elements of the risk management process
3  cards
Section 9.86 Quantitative Risk Analysis
Objective 5.2: Explain elements of the risk management process
6  cards
Section 9.87 Risk Management Strategies
Objective 5.2: Explain elements of the risk management process
6  cards
Section 9.89 Risk Monitoring and Reporting
Objective 5.2: Explain elements of the risk management process
8  cards
Section 10.90 Third-party Vendor Risks & Supply Chain Risks
Objectives 2.2 Explain common threat vectors and attack surfaces. Objectives 2.3 Explain various types of vulnerabilities. Objectives 5.3 Explain the processes associated with third-party risk assessment and management.
6  cards
Section 10.91 Supply Chain Attacks
Objectives 2.2 Explain common threat vectors and attack surfaces. Objectives 2.3 Explain various types of vulnerabilities. Objectives 5.3 Explain the processes associated with third-party risk assessment and management.
3  cards
Section 10.92 Vendor Assessment
Objectives 2.2 Explain common threat vectors and attack surfaces. Objectives 2.3 Explain various types of vulnerabilities. Objectives 5.3 Explain the processes associated with third-party risk assessment and management.
9  cards
Section 10.93 Vendor Selection and Monitoring
Objectives 2.2 Explain common threat vectors and attack surfaces. Objectives 2.3 Explain various types of vulnerabilities. Objectives 5.3 Explain the processes associated with third-party risk assessment and management.
5  cards
Section 10.94 Contracts and Agreements
Objectives 2.2 Explain common threat vectors and attack surfaces. Objectives 2.3 Explain various types of vulnerabilities. Objectives 5.3 Explain the processes associated with third-party risk assessment and management.
8  cards
Section 11.95 Governance and Compliance
Objectives 5.1 Summarise elements of effective security governance. Objectives 5.4 Summarise elements of effective security compliance
10  cards
Section 11.96 Governance
Objectives 5.1 Summarise elements of effective security governance. Objectives 5.4 Summarise elements of effective security compliance
4  cards
Section 11.97 Governance Structures
Objectives 5.1 Summarise elements of effective security governance. Objectives 5.4 Summarise elements of effective security compliance
6  cards
Section 11.98 Policies
Objectives 5.1 Summarise elements of effective security governance. Objectives 5.4 Summarise elements of effective security compliance
7  cards
Section 11.99 Standards
Objectives 5.1 Summarise elements of effective security governance. Objectives 5.4 Summarise elements of effective security compliance
5  cards
Section 11.100 Procedures
Objectives 5.1 Summarise elements of effective security governance. Objectives 5.4 Summarise elements of effective security compliance
4  cards
Section 11.101 Governance Considerations
Objectives 5.1 Summarise elements of effective security governance. Objectives 5.4 Summarise elements of effective security compliance
4  cards
Section 11.102 Compliance
Objectives 5.1 Summarise elements of effective security governance. Objectives 5.4 Summarise elements of effective security compliance
11  cards
Section 11.103 Non-compliance Consequences
Objectives 5.1 Summarise elements of effective security governance. Objectives 5.4 Summarise elements of effective security compliance
7  cards
Section 12.104 Asset and Change Management
Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.
2  cards
Section 12.105 Acquisition and Procurement
Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.
7  cards
Section 12.106 Mobile Asset Deployments
Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.
4  cards
Section 12.107 Asset Management
Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.
10  cards
Section 12.108 Asset Disposal and Decommissioning
Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.
12  cards
Section 12.109 Change Management
Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.
7  cards
Section 12.110 Change Management process
Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.
9  cards
Section 12.111 Technical Implications of Changes
Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.
7  cards
Section 12.112 Documenting Changes
Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.
6  cards
Section 13.113 Audits and Assessments
Objective 5.5: Explain types and purposes of audits and assessments
0  cards

More about
comptia security + (sy0-701)

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Amreek Paul's CompTIA Security + (SY0-701) flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CompTIA Security+ SY0-701 Module 1:
  • 39 decks
  • 59 flashcards
  • 2 learners
Decks: Slide 1 General Security Concepts, Slide 2 Defense In Depth, Slide 3 Essential Terminology, And more!
Make Flashcards