Decks in this Class (26):
-
10 Threat Management
<<<< 1.0 THREAT MANAGEMENT >>>>
0 CardsPreview Flashcards -
11 Threat Management
1.1 Threat Management
Sample Cards:what is a public cloud,what does os fingerprinting involve,what are the three main protocols that c31 CardsPreview Flashcards -
12 Threat Management
1.2 Threat Management
Sample Cards:what is lightweight extensible authentic,which type of analysis involves identify,which wireless protocol provides the bes22 CardsPreview Flashcards -
13 Threat Management
1.3 Threat Management
Sample Cards:what is the most secure implementation o,what is the name for a hole in the secur,which malicious software infects a syste57 CardsPreview Flashcards -
14 Threat Management
1.4 Threat Management
Sample Cards:according to the cysa objectives what ar,is a dhcp server normally placed inside,what is meant by the term exploitation i24 CardsPreview Flashcards -
20 Vulnerability Management
<<<< 2.0 VULNERABILITY MANAGEMENT >>>>
0 CardsPreview Flashcards -
21 Vulnerability Management
2.1 Vulnerability Management
Sample Cards:what should you consult to identify all,what is a flaw loophole or weakness in t,which scan has less of an impact on the38 CardsPreview Flashcards -
22 Vulnerability Management
2.2 Vulnerability Management
Sample Cards:what are the three possible values of th,which value of the authentication au met,which cvss metric describes the authenti33 CardsPreview Flashcards -
23 Vulnerability Management
2.3 Vulnerability Management
Sample Cards:in which type of attack is a user connec,what is meant by vm escape,which type of system does a stuxnet atta56 CardsPreview Flashcards -
30 Cyber Incident Response
<<<< 3.0 CYBER INCIDENT RESPONSE >>>>
0 CardsPreview Flashcards -
31 Cyber Incident Response
3.1 Cyber Incident Response
Sample Cards:what does the acronym mtd denote,what is mtbf,what are the four types of personally id18 CardsPreview Flashcards -
32 Cyber Incident Response
3.2 Cyber Incident Response
Sample Cards:what is the best method to preserve evid,what is the order of volatility from mos,what are the four documents forms that s19 CardsPreview Flashcards -
33 Cyber Incident Response
3.3 Cyber Incident Response
Sample Cards:which stakeholder in the incident respon,which stakeholder in the incident respon,what are the four main stakeholder group8 CardsPreview Flashcards -
34 Cyber Incident Response
3.4 Cyber Incident Response
Sample Cards:what is data exfiltration,what should you do if you discover rogue,what happens in vertical privilege escal11 CardsPreview Flashcards -
35 Cyber Incident Response
3.5 Cyber Incident Response
Sample Cards:what is the best way to determine the at,why should a first responder be familiar,which eradication technique reinstalling17 CardsPreview Flashcards -
40 Security Architecture And Tool Sets
<<<< 4.0 SECURITY ARCHITECTURE AND TOOL SETS >>>>
0 CardsPreview Flashcards -
41 Security Architecture And Tool Sets
4.1 Security Architecture and Tool Sets
Sample Cards:which audit category will audit all inst,what is another term for logical control,which type of controls dictates how secu36 CardsPreview Flashcards -
42 Security Architecture And Tool Sets
4.2 Security Architecture and Tool Sets
Sample Cards:what is the top most level of the ldap h,what is the primary function of ldap,what are flood guards45 CardsPreview Flashcards -
43 Security Architecture And Tool Sets
4.3 Security Architecture and Tool Sets
Sample Cards:what are the two types of ciphers,what is most commonly used to provide pr,which key is used to decrypt a digital s18 CardsPreview Flashcards -
44 Security Architecture And Tool Sets
4.4 Security Architecture and Tool Sets
Sample Cards:what is the purpose of filters on a web,what is the purpose of sandbox in a java,which error condition arises because dat31 CardsPreview Flashcards -
45 Security Architecture And Tool Sets
4.5 Security Architecture and Tool Sets
Sample Cards:what are the five monitoring tools analy,what is wireshark,what are the three ips tools38 CardsPreview Flashcards -
10 Threat Management
1.0 Threat Management
Sample Cards:what is a public cloud,what does os fingerprinting involve,what are the three main protocols that c134 CardsPreview Flashcards -
20 Vulnerability Management
2.0 Vulnerability Management
Sample Cards:what should you consult to identify all,what is a flaw loophole or weakness in t,which scan has less of an impact on the127 CardsPreview Flashcards -
30 Cyber Incident Response
3.0 Cyber Incident Response
Sample Cards:what does the acronym mtd denote,what is mtbf,what are the four types of personally id73 CardsPreview Flashcards -
40 Security Architecture And Tool Sets
4.0 Security Architecture and Tool Sets
Sample Cards:which audit category will audit all inst,what is another term for logical control,which type of controls dictates how secu168 CardsPreview Flashcards -
All
ALL
Sample Cards:what is a public cloud,what does os fingerprinting involve,what are the three main protocols that c502 CardsPreview Flashcards
Current Learners (33)
-
Marian Jordan 1003 cards viewed
-
Dirk Schwarz 353 cards viewed
-
Grant Sutton See full stats
-
Sanfo Agyo See full stats
-
Victor Marquez See full stats
-
Unknown Unknown See full stats
-
paulo guiao See full stats
-
George Munroe See full stats
-
Ken Askew See full stats
-
Clayton Carr See full stats
Popular Related Classes Brainscape Certified - ( See All )
CYSA+
5 Decks -
127 Cards -
1 Learners
Decks: Common Network Ports, Osi Layers, Ivmf Network Concepts, And more!
CS2002
18 Decks -
170 Cards -
2 Learners
Decks: Architecture 01, Architecture 02, Architecture 03, And more!
Biology 201
18 Decks -
2759 Cards -
7 Learners
Decks: Lecture Exam 1, Lecture Exam 1 Review Sheet, Lab Midterm Part 1, And more!
Psy. 401
5 Decks -
191 Cards -
172 Learners
Decks: Ch 3 Studying The Damaged Brain, Ch 5 Sensation And Perception, Ch 6, And more!