CISSP ISC2 2023

This class was created by Brainscape user Yuvaraj P N. Visit their profile to learn more about the creator.

Decks in this class (90)

CISSP (Glossary)
Access 1,
Access control 2,
Access control list acl 3
27  cards
CISSP Lesson 1 PreTest
What is a threat a any weakness i...,
According to rfc 1087 which actio...,
The annual loss expectancy equati...
18  cards
Domain 1 - Access Control
Crackers are defined as 1,
The clark wilson model relies on ...,
The industry best practice for pa...
25  cards
CISSP (Chapter 3 - Access Control)
Which of the following statements...,
Which of the following statements...,
How is a challenge response proto...
32  cards
CISSP (Domain 1 - Access Control)
What are access control mechanisms 1,
3 main types of access control me...,
Administrative controls 3
54  cards
CISSP (Chapter 1)
Which of the following provides a...,
Which of the following is the bes...,
Which of the following is the bes...
48  cards
Access Control
All of the following are needed f...,
Which of the following is true re...,
A large table includes multiple s...
36  cards
Video Content Lesson 1
Security triad 2,
Confidentiality 3,
Confidentiality 4
49  cards
CISSP Lesson 2 PreTest
Which is not a criterion for clas...,
A host based intrusion detection ...,
Which is an example of an adminis...
17  cards
Domain 2 - Telecommunications and Network Security
26 arp is an acronym for 1,
30 the lower layers of the osi mo...,
31 one method often used to reduc...
25  cards
CISSP (Domain 2 - Telecommunications and Network Security)
Physical layer osi 1,
Data link layer osi 2,
8025 3
78  cards
CISSP (Chapter 2 - Information Security Governance and Risk Management)
Who has the primary responsibilit...,
If different user groups with dif...,
What should management consider t...
38  cards
Telecommunications and Network Security
A vpn can be established over whi...,
Which of the following ip address...,
Which of the following is not an ...
46  cards
CISSP (Chapter 6 - Telecommunications and Network Security
What does it mean if someone says...,
How does tkip provide more protec...,
Which of the following is not a c...
41  cards
Video Content Lesson 2
Access control 2,
Least privilege 3,
Accountability 4
46  cards
CISSP Lesson 3 PreTest
Which is a characteristic of symm...,
Cryptography does not provide int...,
What do digital signatures ensure 4
19  cards
Domain 3 - Information Security Governance and Risk Management
2 the basic component of a genera...,
15 making computer users aware of...,
28 agreements used to give notice...
25  cards
CISSP (Domain 3 - Information Security Governance and Risk Management)
4 item for a business model for i...,
6 interconnections for a business...,
Corporate governance 3
63  cards
Information Security Guidelines and Risk Managerment
When seeking to hire new employee...,
Which of the following describes ...,
Which of the following is typical...
44  cards
Video Content Lesson 3
Julius caesar s cryptography was ...,
Famous german encryption machine 3,
Japanese encryption machine 4
49  cards
CISSP Lesson 4 PreTest
Which type of threat is every com...,
Which is an administrative control 3,
Which type of control dictates po...
15  cards
Domain 4 - Software Development Security
Maintenance hooks are a security ...,
All of the following are effectiv...,
A polymorphic virus is a type of ...
26  cards
CISSP (Domain 4 - Software Development Security)
Waterfall method 1,
Prototyping method 2,
Spiral model 3
63  cards
CISSP (Chapter 10 - Software Development Security)
An application is downloaded from...,
What is the importance of inferen...,
A system has been patched many ti...
30  cards
Video Content Lesson 4
Physical security 2,
Threats 1 5 3,
Threats 6 9 4
30  cards
CISSP Lesson 5 PreTest
Subjects should have least privil...,
Which category defined in the tru...,
Hardware is any tangible part of ...
20  cards
Domain 5 - Cryptography
Which is true about des 1,
In relationship to cryptography w...,
The ipsec standard includes a spe...
25  cards
Cryptography
What does ipsec define 2,
What is the minimum number of cry...,
What is the length of the cryptog...
42  cards
CISSP (Domain 5 - Cryptography)
4 cryptography goals 1,
Hash 2,
Symmetric ciphers algorithms 3
49  cards
CISSP (Chapter 7 - Cryptography)
What is the goal of cryptanalysis 1,
The frequency of successful brute...,
Which of the following is not a p...
32  cards
Video Content Lesson 5
Organization 2,
Computer hardware types 3,
Cpu 4
50  cards
CISSP Lesson 6 PreTest
Which data center site takes the ...,
What happens during a full interr...,
Who should be on the bcp team cho...
15  cards
Domain 6 - Security Architecture and Design
21 which of the following is not ...,
25 which of the following storage...,
47 the protection mechanisms with...
26  cards
CISSP (Domain 6 - Security Architecture and Design)
State machine formal security mod...,
Multi level lattice formal securi...,
Non interference formal security ...
47  cards
Security Architecture and Design
Which database security risk occu...,
What is a security perimeter choo...,
How many major categories do the ...
63  cards
CISSP (Chapter 4 - Security Architecture and Design)
What is the final step in authori...,
What feature enables code to be e...,
If a component fails a system sho...
31  cards
CISSP (Chapter 5 - Physical and Environmental Security)
What is the first step that shoul...,
A company needs to implement a cc...,
When should a class c fire exting...
30  cards
Video Content Lesson 6
Business continuity plans project...,
Industry and professional standar...,
Legislative compliance 4
38  cards
CISSP Lesson 7 PreTest
Which vpn protocol provides mutua...,
Which organization created the se...,
Which cable standards can be used...
18  cards
Domain 7 - Operations Security
3 a sensitivity label is a piece ...,
10 audit trails maintain a record...,
19 cleanliness of media is import...
26  cards
CISSP (Domain 7 - Operations Security)
Operational assurance 1,
4 steps to operational assurance 2,
10 administrative controls 3
26  cards
Security Operations
Which of the following activities...,
Of the following choices what is ...,
You need to ensure a service prov...
38  cards
Video Content Lesson 7
Osi reference model 2,
Protocols 3,
Standards organizations 4
46  cards
CISSP Lesson 8 PreTest
Which is a function of a gateway 2,
A dos attack is typically against...,
Which statement describes the has...
20  cards
Domain 8 - Business Continuity and Disaster Recovery Planning
4 the primary audience for the bu...,
9 during the recovery plan develo...,
13 overall enterprise wide respon...
25  cards
CISSP (Domain 8 - Business Continuity and Disaster Recover Planning)
Business continuity planning bcp 1,
Disaster recovery planning drp 2,
Nist 800 34 3
40  cards
Business Continuity and Disaster Recovery
You are concerned about the risk ...,
What unit of measurement should b...,
In which one of the following dat...
41  cards
CISSP (Chapter 8 - Business Continuity and Disaster Recovery)
What action should take place to ...,
What is one of the first steps in...,
How often should a business conti...
30  cards
Video Content Lesson 8
Network devices 2,
Hubs 3,
Bridges 4
42  cards
CISSP Lesson 9 PreTest
A pda has which kind of memory 2,
Network isolation is an example o...,
Which statements are true concern...
20  cards
Domain 9 - Legal, Regulations, Investigations, and Compliance
11 there are three primary kinds ...,
18 a trojan horse differs from a ...,
22 the us freedom of information ...
25  cards
CISSP (Domain 9 - Legal, Regulations, Compliance, and Investigations)
Civil law tort 1,
Criminal law 2,
Compensatory damage civil law 3
34  cards
Legal Regulations Investigation and Compliance
What is the standard duration of ...,
Why are military and intelligence...,
What type of law does not require...
44  cards
CISSP (Chapter 9 - Legal, Regulations, Investigations, and Compliance)
Which of the following does the i...,
What is the study of computers an...,
Which of the following does the i...
31  cards
Video Content Lesson 9
Application issues 2,
Software development 3,
Application environments 4
55  cards
CISSP Lesson 10 PreTest
How often should monitoring be im...,
Which is the best countermeasure ...,
What is the purpose of separation...
15  cards
Domain 10 - Physical (Environmental) Security
1 automatic control devices for a...,
5 the principle of concentric con...,
8 in a secure area the organizati...
25  cards
Physical Environmental Security
At what voltage level can static ...,
What type of physical security co...,
Which of the following is typical...
22  cards
CISSP (Domain 10 - Physical (Environmental) Security)
Crime prevention through environm...,
Physical controls 2,
Technical controls 3
41  cards
Video Content Lesson 10
Administrative management 2,
Overview 3,
Duty separation 4
45  cards
CISSP Lesson 11 PreTest
Which statement is true regarding...,
In order for evidence to be admis...,
Which was introduced in the compu...
14  cards
Video Content Lesson 11
Question 1,
Types of computer crime 2,
Overview 3
48  cards
Practice Test Mistakes
Which of the following best descr...,
During a penetration test of her ...,
Which one of the following is not...
88  cards
CISSP Notes
Type of malware which can change ...,
Best practice when it comes to ta...,
Type of self sufficient malware 3
350  cards
CISSP Notes 2
Are launched directly from an att...,
Behavioral biometric method that ...,
The amount of time the biometric ...
100  cards
CISSP Notes 3
Packers 1,
Compartmented security mode 2,
Sutherland model 3
400  cards
Chapter 1 - Security Governance Through Principles And Policies
Seclusion 1,
Levels of government military cla...,
Confidential vs private data in c...
29  cards
Chapter 2 - Personnel Security And Risk Management Concepts
Define personally identifiable in...,
Calculating safeguard cost benefi...,
The importance of job descriptions 3
20  cards
Chapter 3 - Business Continuty Planning
Strategy development 1,
Differences between business cont...,
Business organization analysis 3
13  cards
Chapter 4 - Laws, Regulations, And Compliance
Scope of computer fraud and abuse...,
The scope of computer security ac...,
Fourth amendment 3
22  cards
Chapter 5 - Protecting Security Of Assets
Describe the best method to sanit...,
Identify the problem with sanitat...,
Most reliable way of destroying d...
7  cards
Chapter 6 - Cryptography And SYmmetric Key Algorithms
Modulo function 1,
Codes vs ciphers 2,
Differences between caesar cipher...
47  cards
Chapter 7 - PKI And Cryptographic Applications
Hash algorithm memorization chart 1,
4 simple rules of public key cryp...,
Link encryption vs end to end enc...
28  cards
Chapter 8 - Principles Of Security Models, Design, and Capabilities
Confinement 1,
Definition of state machine model...,
Declassification process 3
58  cards
Chapter 9 - Security Vulnerabilities, Threats, and Countermeasures
Multithread 1,
What type of memory device is usu...,
Three types of cloud computering 3
5  cards
Chapter 10 - Physical Security Requirements
What does not need to be true in ...,
What is the most common form of p...,
What is not a disadvantage of usi...
27  cards
Chapter 11 - Secure Network Architecture and Securing Network Components
Which osi model layer manages com...,
Cable is the least resistant to e...,
Which networking technology is ba...
51  cards
Chapter 12 - Secure Communications and Network Attacks
At which osi model layer does the...,
When you are designing a security...,
What need to be discussed with en...
17  cards
Chapter 13 - Managing Identity and Authentication
Accountability does not require w...,
What is the function of the netwo...,
Differences between active direct...
3  cards
Chapter 14 - Controlling And Monitoring Access
Identity based access control mod...,
Main differences between discreti...,
What best describes a characteris...
15  cards
Chapter 15 - Security Assessment and Testing
Who is the intended audience for ...,
What type of network discovery sc...,
Web application scanning frequenc...
12  cards
Chapter 16 - Managing Security Operations
Define the difference between nee...,
Define patch management process 2,
Key elements of configuration man...
10  cards
Chapter 17 - Preventing and Responding To Incidents
The role of monitoring 1,
Clipping levels 2
2  cards
Chapter 18 - Disaster Recovery Planning
According to the federal emergenc...,
Which disaster type is not usuall...,
How long does it take to activate...
18  cards
Chapter 19 - Incidents And Ethics
Hacktivists are motivated by what...,
What is the best way to recognize...,
According to isc 2 code of ethics...
7  cards
Chapter 20 - Software Development Security
In which phase of the sm cmm does...,
Differences between content depen...,
What type of information is used ...
45  cards
Chapter 21: Malicious Code and Application Attacks
Main difference between virus and...,
Stuxnet 2,
Polymorphic virus 3
9  cards
SYBEX -Wrong Questions from Skillset
Which civil law category would wr...,
Which one of these give best prot...,
A computer is running on a window...
10  cards
CISSP-Security and Risk Management-Domain 1
What does spof stand for 1,
What does the acronym sox stand f...,
What is due care 3
110  cards
ISO and NIST 2
What is nist sp 800 12 1,
What is nist sp 800 53 2,
What is iso 27005 3
18  cards

More about
CISSP ISC2 2023

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Yuvaraj P N's CISSP ISC2 2023 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CISSP ISC2 EXAM
  • 74 decks
  • 3542 flashcards
  • 61 learners
Decks: Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, And more!
CISSP 2023 Prep
  • 21 decks
  • 797 flashcards
  • 4 learners
Decks: Mnemonics And Memorization Techniques, Code Of Ethics, Domain 1 Security And Risk Management, And more!
CISSP
  • 43 decks
  • 2470 flashcards
  • 693 learners
Decks: Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, And more!
Make Flashcards