This class was created by Brainscape user Maximilian Ernst. Visit their profile to learn more about the creator.

Decks in this class (14)

Basic Architecture RDBMS
What term can be used for tables,
What does a table contain,
What terms can be used for rows
14  cards
Types of storage
Other definition for primary memory,
Primary memory is directly availa...,
Primary memory usually consists of
18  cards
Machine Learning & Neural Networks
Expert systems two main components,
What does a knowledge base contain,
What does an inference engine use
6  cards
System Development Models
Key characteristics of agile deve...,
Key characteristics of waterfall ...,
Key characteristics of spiral dev...
9  cards
Software Development Maturity Models
Goal of software development matu...,
Two examples for software develop...,
5 steps of sw cmm
14  cards
Change and Configuration Management
Request control what is it used for,
Change control what is it used for,
Release control what is it used for
3  cards
Virus Propagation Techniques
File infection,
Service injection,
Boot sector infection
4  cards
Application Attacks
Buffer overflow,
During which stage is a back door...,
Characteristics of back door
5  cards
Web Application Vulnerabilities
What is cross site scripting xss,
What is xss used for,
How does sql injection attack wor...
4  cards
Network Reconnaissance Techniques (Discovery!)
What is network reconnaissance us...,
How do ip probes work,
What is the goal of ip probes
7  cards
Protection Rings
How many rings does the concept o...,
Ring 0,
Ring 1
8  cards
Software Development Lifecycle (SDLC)
Memo for five stages of sdlc,
Five stages of sdlc
2  cards
Concentric Circle Security
Definition of concentric circle s...,
What does concentric circle secur...,
Why is concentric circle security...
5  cards
Acquired Software Security Impact
Operating system attacks,
Application level attacks,
Shrink wrap code attacks
4  cards

More about
CISSP Domain 8

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Maximilian Ernst's CISSP Domain 8 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CISSP Domains 1-8
  • 3 decks
  • 70 flashcards
  • 6 learners
Decks: Chapter 1 Domain 1 Security And Risk Man, Chapter 5 Domain 2 Asset Security, Chapter 6 Domain 2 Asset Security, And more!
CISSP Domain 1:Security and Risk Mana...
  • 7 decks
  • 34 flashcards
  • 29 learners
Decks: Cornerstone Security Principles, Risk Management, Risk Acquisition, And more!
Domain 8 - Supply Chain and Software ...
  • 4 decks
  • 97 flashcards
  • 1 learners
Decks: Software Acquisition And The Supply Chai, Software Development And Testing, Software Scrm During Delivery Handover, And more!
Make Flashcards