This class was created by Brainscape user Oliver Crawford. Visit their profile to learn more about the creator.

Decks in this class (32)

Access Control
All of the following are needed f...,
Which of the following is true re...,
A large table includes multiple s...
36  cards
Telecommunications and Network Security
A vpn can be established over whi...,
Which of the following ip address...,
Which of the following is not an ...
46  cards
Information Security Guidelines and Risk Managerment
When seeking to hire new employee...,
Which of the following describes ...,
Which of the following is typical...
44  cards
Software Development Security
What is the value of the logical ...,
In systems utilizing a ring prote...,
Which one of the following terms ...
27  cards
Cryptography
What does ipsec define 2,
What is the minimum number of cry...,
What is the length of the cryptog...
42  cards
Video Content Lesson 1
Security triad 2,
Confidentiality 3,
Confidentiality 4
49  cards
Security Architecture and Design
Which database security risk occu...,
What is a security perimeter choo...,
How many major categories do the ...
63  cards
Video Content Lesson 2
Access control 2,
Least privilege 3,
Accountability 4
46  cards
CISSP Lesson 1 PreTest
What is a threat a any weakness i...,
According to rfc 1087 which actio...,
The annual loss expectancy equati...
18  cards
CISSP Lesson 2 PreTest
Which is not a criterion for clas...,
A host based intrusion detection ...,
Which is an example of an adminis...
17  cards
Video Content Lesson 3
Julius caesar s cryptography was ...,
Famous german encryption machine 3,
Japanese encryption machine 4
49  cards
Security Operations
Which of the following activities...,
Of the following choices what is ...,
You need to ensure a service prov...
38  cards
Video Content Lesson 4
Physical security 2,
Threats 1 5 3,
Threats 6 9 4
30  cards
Business Continuity and Disaster Recovery
You are concerned about the risk ...,
What unit of measurement should b...,
In which one of the following dat...
41  cards
Video Content Lesson 5
Organization 2,
Computer hardware types 3,
Cpu 4
50  cards
Legal Regulations Investigation and Compliance
What is the standard duration of ...,
Why are military and intelligence...,
What type of law does not require...
44  cards
Physical Environmental Security
At what voltage level can static ...,
What type of physical security co...,
Which of the following is typical...
22  cards
Video Content Lesson 6
Business continuity plans project...,
Industry and professional standar...,
Legislative compliance 4
38  cards
Video Content Lesson 7
Osi reference model 2,
Protocols 3,
Standards organizations 4
46  cards
Video Content Lesson 8
Network devices 2,
Hubs 3,
Bridges 4
42  cards
Video Content Lesson 9
Application issues 2,
Software development 3,
Application environments 4
55  cards
Video Content Lesson 10
Administrative management 2,
Overview 3,
Duty separation 4
45  cards
Video Content Lesson 11
Question 1,
Types of computer crime 2,
Overview 3
48  cards
CISSP Lesson 3 PreTest
Which is a characteristic of symm...,
Cryptography does not provide int...,
What do digital signatures ensure 4
19  cards
CISSP Lesson 4 PreTest
Which type of threat is every com...,
Which is an administrative control 3,
Which type of control dictates po...
15  cards
CISSP Lesson 5 PreTest
Subjects should have least privil...,
Which category defined in the tru...,
Hardware is any tangible part of ...
20  cards
CISSP Lesson 6 PreTest
Which data center site takes the ...,
What happens during a full interr...,
Who should be on the bcp team cho...
15  cards
CISSP Lesson 7 PreTest
Which vpn protocol provides mutua...,
Which organization created the se...,
Which cable standards can be used...
18  cards
CISSP Lesson 8 PreTest
Which is a function of a gateway 2,
A dos attack is typically against...,
Which statement describes the has...
20  cards
CISSP Lesson 9 PreTest
A pda has which kind of memory 2,
Network isolation is an example o...,
Which statements are true concern...
20  cards
CISSP Lesson 10 PreTest
How often should monitoring be im...,
Which is the best countermeasure ...,
What is the purpose of separation...
15  cards
CISSP Lesson 11 PreTest
Which statement is true regarding...,
In order for evidence to be admis...,
Which was introduced in the compu...
14  cards

More about
CISSP Exam

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Oliver Crawford's CISSP Exam flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CISSP ISC2 EXAM
  • 74 decks
  • 3542 flashcards
  • 57 learners
Decks: Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, And more!
CISSP
  • 43 decks
  • 2470 flashcards
  • 666 learners
Decks: Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, And more!
.DENTAL BOARD EXAM REVIEWER
  • 38 decks
  • 5295 flashcards
  • 1731 learners
Decks: 1 Cellular Anatomy, 2 Cellular Division, 3 Cellular Transport, And more!
Make Flashcards