This class was created by Brainscape user Chad Wilson. Visit their profile to learn more about the creator.

Decks in this class (30)

Domain 1: Legal and Regulatory Issues
Major legal system the distinguis...,
Major legal system a significant ...,
Laws in which the primary goal is...
58  cards
Domain 1: Risk Analysis
Valuable resources that need prot...,
Potentially harmful occurrence 2,
A weakness that can allow a threa...
34  cards
Domain 1: Everything Else
When a user cannot deny having pe...,
Users should be granted the minim...,
Users must know a specific piece ...
45  cards
Domain 1: Threat Modeling
The security process where potent...,
Threat modeling that takes place ...,
Threat modeling that takes place ...
29  cards
Domain 2: Classifying Data
Unauthorized disclosure could cau...,
Unauthorized disclosure could cau...,
Unauthorized disclosure could cau...
39  cards
Domain 2: Memory and Remanence
Data that persists beyond noninva...,
Data most frequently used by the ...,
Cpu onboard memory 3
27  cards
Domain 2: Determining Data Security Controls
System has been approved to meet ...,
Data owner s acceptance of the ce...,
Risk management framework from ca...
30  cards
Domain 3: Security Models
Reading down occurs when a subjec...,
Provides confidentiality of objec...,
Bell lapadula property 3
31  cards
Domain 3: System Design
Uses multiple security controls i...,
Generic list of security architec...,
Hides unnecessary details from th...
48  cards
Domain 3: System Vulnerabilities
Method that is used to pass info ...,
Shortcut in a system that allows ...,
Backdoor installed by developers ...
40  cards
Domain 3: Cryptography
Science of breaking encrypted mes...,
Always hides the true meaning of ...,
Unencrypted message 3
31  cards
Domain 3: Types of Cryptography
Uses a single key to encrypt and ...,
Means each bit is independently e...,
Encrypts blocks of data each round 3
38  cards
Domain 3: Cryptography Attacks and Implementing
Algebraic manipulation that attem...,
Attack that focus on the exploiti...,
Attack that attempts to find the ...
34  cards
Domain 3: Environmental Controls
Proper level of humidity in a dat...,
High humidity levels in a data ce...,
Alerts when temperature exceeds a...
41  cards
Domain 4: Communication and Network Security
Name the layers of the tcp ip mod...,
Open standard primarily used with...,
Storage networking that leverages...
37  cards
Domain 5: Authentication Methods
Authentication method 1,
Type of password reusable passwor...,
Type of password long passwords c...
47  cards
Domain 5: Access Control Technologies
Concentrates access control in on...,
Access control where local sites ...,
Allows users to authenticate once...
49  cards
Domain 6: Security Assessment and Testing
Pen test begins with no info begi...,
Provides internal info to the pen...,
Pen tester receives some limited ...
26  cards
Domain 7: Forensics and Incident Response
Ensures that multiple people are ...,
Provides a type of knowledge redu...,
Requires employees to be away fro...
30  cards
Domain 7: Assessment Management
Name the 4 types of ids events 1,
Types of ids event 2,
Types of ids event 3
31  cards
Domain 7: BCP/DRP
Plan that ensures that a business...,
Short term plan for dealing with ...,
List the documents inside of a bcp 3
29  cards
Domain 7: BCP/DRP pt 2
Business continuity planning proc...,
Describes the total time a system...,
What are some alternate terms for...
30  cards
Domain 7 : Backups
Each employee is assigned a small...,
Command post established during o...,
Any data accessed through reading...
20  cards
Domain 8: Programming Concepts
Programming language instructions...,
Source code functions that can be...,
Uses programs to assist in the cr...
37  cards
Domain 8: Databases
Controls all access to the databa...,
Allows for searching within a dat...,
Creates relationships between rec...
25  cards
Domain 8: Software Security
Oop term 1,
Oop term 2,
Oop terms 3
32  cards
Domain 4: Communication and Network Security Pt 2
Lan technology numerous devices c...,
Lan technology uses a token passi...,
Lan technology high speed employs...
30  cards
Domain 4: Communication and Network Security Pt 3
Utp category throughput voice onl...,
Utp category throughput 4 mbps no...,
Utp category throughput 10 mbps p...
39  cards
Domain 8: Database pt 2
Data is stored in more than one d...,
Mixing data in a database with di...,
Number of rows tuples in a relati...
23  cards
Domain 6: Security Assessment and Testing pt 2
Attempts to identity the degree t...,
The goal here is to ensure that s...,
Common vulnerability scoring syst...
26  cards

More about
CISSP

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Chad Wilson's CISSP flashcards for their Metro State University Denver class now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CISSP
  • 43 decks
  • 2470 flashcards
  • 691 learners
Decks: Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, And more!
CISSP
  • 21 decks
  • 865 flashcards
  • 2751 learners
Decks: Cissp Chapter 1, Cissp Glossary, Cissp Domain 1 Access Control, And more!
CISSP Exam
  • 32 decks
  • 1092 flashcards
  • 2663 learners
Decks: Access Control, Telecommunications And Network Security, Information Security Guidelines And Risk, And more!
CISSP
  • 16 decks
  • 2148 flashcards
  • 705 learners
Decks: Security Management Practices, Security Architecture And Models, Access, And more!
Make Flashcards