This class was created by Brainscape user Chad Wilson. Visit their profile to learn more about the creator.

Decks in this class (30)

Domain 1: Legal and Regulatory Issues
Major legal system the distinguis...,
Major legal system a significant ...,
Laws in which the primary goal is...
58  cards
Domain 1: Risk Analysis
Valuable resources that need prot...,
Potentially harmful occurrence ie...,
A weakness that can allow a threa...
34  cards
Domain 1: Everything Else
When a user cannot deny having pe...,
Users should be granted the minim...,
Users must know a specific piece ...
45  cards
Domain 1: Threat Modeling
The security process where potent...,
Threat modeling that takes place ...,
Threat modeling that takes place ...
29  cards
Domain 2: Classifying Data
Unauthorized disclosure could cau...,
Unauthorized disclosure could cau...,
Unauthorized disclosure could cau...
39  cards
Domain 2: Memory and Remanence
Data that persists beyond noninva...,
Data most frequently used by the cpu,
Cpu onboard memory
27  cards
Domain 2: Determining Data Security Controls
System has been approved to meet ...,
Data owner s acceptance of the ce...,
Risk management framework from ca...
30  cards
Domain 3: Security Models
Reading down occurs when a subjec...,
Provides confidentiality of objec...,
Bell lapadula property no read up...
31  cards
Domain 3: System Design
Uses multiple security controls i...,
Generic list of security architec...,
Hides unnecessary details from th...
48  cards
Domain 3: System Vulnerabilities
Method that is used to pass info ...,
Shortcut in a system that allows ...,
Backdoor installed by developers ...
40  cards
Domain 3: Cryptography
Science of breaking encrypted mes...,
Always hides the true meaning of ...,
Unencrypted message
31  cards
Domain 3: Types of Cryptography
Uses a single key to encrypt and ...,
Means each bit is independently e...,
Encrypts blocks of data each roun...
38  cards
Domain 3: Cryptography Attacks and Implementing
Algebraic manipulation that attem...,
Attack that focus on the exploiti...,
Attack that attempts to find the ...
34  cards
Domain 3: Environmental Controls
Proper level of humidity in a dat...,
High humidity levels in a data ce...,
Alerts when temperature exceeds a...
41  cards
Domain 4: Communication and Network Security
Name the layers of the tcp ip model,
Open standard primarily used with...,
Storage networking that leverages...
37  cards
Domain 5: Authentication Methods
Authentication method testing the...,
Type of password reusable passwor...,
Type of password long passwords c...
47  cards
Domain 5: Access Control Technologies
Concentrates access control in on...,
Access control where local sites ...,
Allows users to authenticate once...
49  cards
Domain 6: Security Assessment and Testing
Pen test begins with no info begi...,
Provides internal info to the pen...,
Pen tester receives some limited ...
26  cards
Domain 7: Forensics and Incident Response
Ensures that multiple people are ...,
Provides a type of knowledge redu...,
Requires employees to be away fro...
30  cards
Domain 7: Assessment Management
Name the 4 types of ids events,
Types of ids event a worm spreadi...,
Types of ids event user surfs the...
31  cards
Domain 7: BCP/DRP
Plan that ensures that a business...,
Short term plan for dealing with ...,
List the documents inside of a bcp
29  cards
Domain 7: BCP/DRP pt 2
Business continuity planning proc...,
Describes the total time a system...,
What are some alternate terms for...
30  cards
Domain 7 : Backups
Each employee is assigned a small...,
Command post established during o...,
Any data accessed through reading...
20  cards
Domain 8: Programming Concepts
Programming language instructions...,
Source code functions that can be...,
Uses programs to assist in the cr...
37  cards
Domain 8: Databases
Controls all access to the databa...,
Allows for searching within a dat...,
Creates relationships between rec...
25  cards
Domain 8: Software Security
Oop term used to describe level o...,
Oop term used to describe the lev...,
Oop terms object that greatly dep...
32  cards
Domain 4: Communication and Network Security Pt 2
Lan technology numerous devices c...,
Lan technology uses a token passi...,
Lan technology high speed employs...
30  cards
Domain 4: Communication and Network Security Pt 3
Utp category throughput voice onl...,
Utp category throughput 4 mbps no...,
Utp category throughput 10 mbps p...
39  cards
Domain 8: Database pt 2
Data is stored in more than one d...,
Mixing data in a database with di...,
Number of rows tuples in a relati...
23  cards
Domain 6: Security Assessment and Testing pt 2
Attempts to identity the degree t...,
The goal here is to ensure that s...,
Common vulnerability scoring syst...
26  cards

More about
CISSP

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Chad Wilson's CISSP flashcards for their Metro State University Denver class now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CISSP
  • 10 decks
  • 1195 flashcards
  • 255 learners
Decks: 2 Telecommunications And Network Securit, 3 Access Control, 4 Cryptography, And more!
CISSP
  • 10 decks
  • 822 flashcards
  • 481 learners
Decks: Access Control, Telecommunications And Network Security, Information Security Governance And Risk, And more!
CISSP ISC2 2023
  • 90 decks
  • 3704 flashcards
  • 43 learners
Decks: Cissp Glossary, Cissp Lesson 1 Pretest, Domain 1 Access Control, And more!
CISSP
  • 22 decks
  • 1024 flashcards
  • 117 learners
Decks: Introduction, Chapter 1 Access Control, Chapter 2 Access Control Attacks And Mon, And more!
Make Flashcards