CISSP ISC2 2023

This class was created by Brainscape user Yuvaraj P N. Visit their profile to learn more about the creator.

Decks in this class (90)

CISSP (Glossary)
Access,
Access control,
Access control list acl
27  cards
CISSP Lesson 1 PreTest
What is a threat a any weakness i...,
According to rfc 1087 which actio...,
The annual loss expectancy equati...
18  cards
Domain 1 - Access Control
17 crackers are defined as a soft...,
27 the clark wilson model relies ...,
63 the industry best practice for...
25  cards
CISSP (Chapter 3 - Access Control)
Which of the following statements...,
Which of the following statements...,
How is a challenge response proto...
32  cards
CISSP (Domain 1 - Access Control)
What are access control mechanisms,
3 main types of access control me...,
Administrative controls
54  cards
CISSP (Chapter 1)
Which of the following provides a...,
Which of the following is the bes...,
Which of the following is the bes...
48  cards
Access Control
Access control,
Access control,
Access control
36  cards
Video Content Lesson 1
Video content lesson 1,
Video content lesson 1,
Video content lesson 1
49  cards
CISSP Lesson 2 PreTest
Cissp lesson 2 pretest,
Cissp lesson 2 pretest,
Cissp lesson 2 pretest
17  cards
Domain 2 - Telecommunications and Network Security
26 arp is an acronym for a addres...,
30 the lower layers of the osi mo...,
31 one method often used to reduc...
25  cards
CISSP (Domain 2 - Telecommunications and Network Security)
Physical layer osi,
Data link layer osi,
8025
78  cards
CISSP (Chapter 2 - Information Security Governance and Risk Management)
Who has the primary responsibilit...,
If different user groups with dif...,
What should management consider t...
38  cards
Telecommunications and Network Security
Telecommunications and network se...,
Telecommunications and network se...,
Telecommunications and network se...
46  cards
CISSP (Chapter 6 - Telecommunications and Network Security
What does it mean if someone says...,
How does tkip provide more protec...,
Which of the following is not a c...
41  cards
Video Content Lesson 2
Video content lesson 2,
Video content lesson 2,
Video content lesson 2
46  cards
CISSP Lesson 3 PreTest
Cissp lesson 3 pretest,
Cissp lesson 3 pretest,
Cissp lesson 3 pretest
19  cards
Domain 3 - Information Security Governance and Risk Management
2 the basic component of a genera...,
15 making computer users aware of...,
28 agreements used to give notice...
25  cards
CISSP (Domain 3 - Information Security Governance and Risk Management)
4 item for a business model for i...,
6 interconnections for a business...,
Corporate governance
63  cards
Information Security Guidelines and Risk Managerment
Information security guidelines a...,
Information security guidelines a...,
Information security guidelines a...
44  cards
Video Content Lesson 3
Video content lesson 3,
Video content lesson 3,
Video content lesson 3
49  cards
CISSP Lesson 4 PreTest
Cissp lesson 4 pretest,
Cissp lesson 4 pretest,
Cissp lesson 4 pretest
15  cards
Domain 4 - Software Development Security
6 maintenance hooks are a securit...,
12 all of the following are effec...,
33 a polymorphic virus is a type ...
26  cards
CISSP (Domain 4 - Software Development Security)
Waterfall method,
Prototyping method,
Spiral model
63  cards
CISSP (Chapter 10 - Software Development Security)
An application is downloaded from...,
What is the importance of inferen...,
A system has been patched many ti...
30  cards
Video Content Lesson 4
Video content lesson 4,
Video content lesson 4,
Video content lesson 4
30  cards
CISSP Lesson 5 PreTest
Cissp lesson 5 pretest,
Cissp lesson 5 pretest,
Cissp lesson 5 pretest
20  cards
Domain 5 - Cryptography
7 which is true about des a it is...,
40 in relationship to cryptograph...,
49 the ipsec standard includes a ...
25  cards
Cryptography
Cryptography,
Cryptography,
Cryptography
42  cards
CISSP (Domain 5 - Cryptography)
4 cryptography goals cain,
Hash,
Symmetric ciphers algorithms
49  cards
CISSP (Chapter 7 - Cryptography)
What is the goal of cryptanalysis...,
The frequency of successful brute...,
Which of the following is not a p...
32  cards
Video Content Lesson 5
Video content lesson 5,
Video content lesson 5,
Video content lesson 5
50  cards
CISSP Lesson 6 PreTest
Cissp lesson 6 pretest,
Cissp lesson 6 pretest,
Cissp lesson 6 pretest
15  cards
Domain 6 - Security Architecture and Design
21 which of the following is not ...,
25 which of the following storage...,
47 the protection mechanisms with...
26  cards
CISSP (Domain 6 - Security Architecture and Design)
State machine formal security mod...,
Multi level lattice formal securi...,
Non interference formal security ...
47  cards
Security Architecture and Design
Security architecture design,
Security architecture design,
Security architecture design
63  cards
CISSP (Chapter 4 - Security Architecture and Design)
What is the final step in authori...,
What feature enables code to be e...,
If a component fails a system sho...
31  cards
CISSP (Chapter 5 - Physical and Environmental Security)
What is the first step that shoul...,
A company needs to implement a cc...,
When should a class c fire exting...
30  cards
Video Content Lesson 6
Video content lesson 6,
Video content lesson 6,
Video content lesson 6
38  cards
CISSP Lesson 7 PreTest
Cissp lesson 7 pretest,
Cissp lesson 7 pretest,
Cissp lesson 7 pretest
18  cards
Domain 7 - Operations Security
3 a sensitivity label is a piece ...,
10 audit trails maintain a record...,
19 cleanliness of media is import...
26  cards
CISSP (Domain 7 - Operations Security)
Operational assurance,
4 steps to operational assurance ...,
10 administrative controls dc dd ...
26  cards
Security Operations
Security operations,
Security operations,
Security operations
38  cards
Video Content Lesson 7
Video content lesson 7,
Video content lesson 7,
Video content lesson 7
46  cards
CISSP Lesson 8 PreTest
Cissp lesson 8 pretest,
Cissp lesson 8 pretest,
Cissp lesson 8 pretest
20  cards
Domain 8 - Business Continuity and Disaster Recovery Planning
4 the primary audience for the bu...,
9 during the recovery plan develo...,
13 overall enterprise wide respon...
25  cards
CISSP (Domain 8 - Business Continuity and Disaster Recover Planning)
Business continuity planning bcp,
Disaster recovery planning drp,
Nist 800 34
40  cards
Business Continuity and Disaster Recovery
Business continuity disaster reco...,
Business continuity disaster reco...,
Business continuity disaster reco...
41  cards
CISSP (Chapter 8 - Business Continuity and Disaster Recovery)
What action should take place to ...,
What is one of the first steps in...,
How often should a business conti...
30  cards
Video Content Lesson 8
Video content lesson 8,
Video content lesson 8,
Video content lesson 8
42  cards
CISSP Lesson 9 PreTest
Cissp lesson 9 pretest,
Cissp lesson 9 pretest,
Cissp lesson 9 pretest
20  cards
Domain 9 - Legal, Regulations, Investigations, and Compliance
11 there are three primary kinds ...,
18 a trojan horse differs from a ...,
22 the us freedom of information ...
25  cards
CISSP (Domain 9 - Legal, Regulations, Compliance, and Investigations)
Civil law tort,
Criminal law,
Compensatory damage civil law
34  cards
Legal Regulations Investigation and Compliance
Legal regulations investigations ...,
Legal regulations investigations ...,
Legal regulations investigations ...
44  cards
CISSP (Chapter 9 - Legal, Regulations, Investigations, and Compliance)
Which of the following does the i...,
What is the study of computers an...,
Which of the following does the i...
31  cards
Video Content Lesson 9
Video content lesson 9,
Video content lesson 9,
Video content lesson 9
55  cards
CISSP Lesson 10 PreTest
Cissp lesson 10 pretest,
Cissp lesson 10 pretest,
Cissp lesson 10 pretest
15  cards
Domain 10 - Physical (Environmental) Security
1 automatic control devices for a...,
5 the principle of concentric con...,
8 in a secure area the organizati...
25  cards
Physical Environmental Security
Physical environmental security,
Physical environmental security,
Physical environmental security
22  cards
CISSP (Domain 10 - Physical (Environmental) Security)
Crime prevention through environm...,
Physical controls,
Technical controls
41  cards
Video Content Lesson 10
Video content lesson 10,
Video content lesson 10,
Video content lesson 10
45  cards
CISSP Lesson 11 PreTest
Cissp lesson 11 pretest,
Cissp lesson 11 pretest,
Cissp lesson 11 pretest
14  cards
Video Content Lesson 11
Name,
Video content lesson 11,
Video content lesson 11
48  cards
Practice Test Mistakes
Which of the following best descr...,
During a penetration test of her ...,
Which one of the following is not...
88  cards
CISSP Notes
Type of malware which can change ...,
Best practice when it comes to ta...,
Type of self sufficient malware
350  cards
CISSP Notes 2
Are launched directly from an att...,
Behavioral biometric method that ...,
The amount of time the biometric ...
100  cards
CISSP Notes 3
Packers,
Compartmented security mode,
Sutherland model
400  cards
Chapter 1 - Security Governance Through Principles And Policies
Seclusion,
Levels of government military cla...,
Confidential vs private data in c...
29  cards
Chapter 2 - Personnel Security And Risk Management Concepts
Define personally identifiable in...,
Calculating safeguard cost benefi...,
The importance of job descriptions
20  cards
Chapter 3 - Business Continuty Planning
Strategy development,
Differences between business cont...,
Business organization analysis
13  cards
Chapter 4 - Laws, Regulations, And Compliance
Scope of computer fraud and abuse...,
The scope of computer security ac...,
Fourth amendment
22  cards
Chapter 5 - Protecting Security Of Assets
Describe the best method to sanit...,
Identify the problem with sanitat...,
Most reliable way of destroying d...
7  cards
Chapter 6 - Cryptography And SYmmetric Key Algorithms
Modulo function,
Codes vs ciphers,
Differences between caesar cipher...
47  cards
Chapter 7 - PKI And Cryptographic Applications
Hash algorithm memorization chart,
4 simple rules of public key cryp...,
Link encryption vs end to end enc...
28  cards
Chapter 8 - Principles Of Security Models, Design, and Capabilities
Confinement,
Definition of state machine model...,
Declassification process
58  cards
Chapter 9 - Security Vulnerabilities, Threats, and Countermeasures
Multithread,
What type of memory device is usu...,
Three types of cloud computering
5  cards
Chapter 10 - Physical Security Requirements
What does not need to be true in ...,
What is the most common form of p...,
What is not a disadvantage of usi...
27  cards
Chapter 11 - Secure Network Architecture and Securing Network Components
Which osi model layer manages com...,
Cable is the least resistant to emi,
Which networking technology is ba...
51  cards
Chapter 12 - Secure Communications and Network Attacks
At which osi model layer does the...,
When you are designing a security...,
What need to be discussed with en...
17  cards
Chapter 13 - Managing Identity and Authentication
Accountability does not require w...,
What is the function of the netwo...,
Differences between active direct...
3  cards
Chapter 14 - Controlling And Monitoring Access
Identity based access control model,
Main differences between discreti...,
What best describes a characteris...
15  cards
Chapter 15 - Security Assessment and Testing
Who is the intended audience for ...,
What type of network discovery sc...,
Web application scanning frequenc...
12  cards
Chapter 16 - Managing Security Operations
Define the difference between nee...,
Define patch management process,
Key elements of configuration man...
10  cards
Chapter 17 - Preventing and Responding To Incidents
The role of monitoring,
Clipping levels
2  cards
Chapter 18 - Disaster Recovery Planning
According to the federal emergenc...,
Which disaster type is not usuall...,
How long does it take to activate...
18  cards
Chapter 19 - Incidents And Ethics
Hacktivists are motivated by what...,
What is the best way to recognize...,
According to isc 2 code of ethics...
7  cards
Chapter 20 - Software Development Security
In which phase of the sm cmm does...,
Differences between content depen...,
What type of information is used ...
45  cards
Chapter 21: Malicious Code and Application Attacks
Main difference between virus and...,
Stuxnet,
Polymorphic virus
9  cards
SYBEX -Wrong Questions from Skillset
Which civil law category would wr...,
Which one of these give best prot...,
A computer is running on a window...
10  cards
CISSP-Security and Risk Management-Domain 1
What does spof stand for,
What does the acronym sox stand for,
What is due care
110  cards
ISO and NIST 2
What is nist sp 800 12,
What is nist sp 800 53,
What is iso 27005
18  cards

More about
CISSP ISC2 2023

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Yuvaraj P N's CISSP ISC2 2023 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CISSP ISC2 EXAM
  • 74 decks
  • 3542 flashcards
  • 47 learners
Decks: Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, And more!
CISSP 2023 Prep
  • 21 decks
  • 797 flashcards
  • 3 learners
Decks: Mnemonics And Memorization Techniques, Code Of Ethics, Domain 1 Security And Risk Management, And more!
CISSP
  • 43 decks
  • 2470 flashcards
  • 619 learners
Decks: Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, And more!
Make Flashcards