This class was created by Brainscape user Elijah Turner. Visit their profile to learn more about the creator.

Decks in this class (26)

Domain 1: (Security and Risk Management)
When evaluating a third party for...,
What are the six phases of the rmf,
What was designed for critical in...
69  cards
Domain 2: (Asset Security)
What is the data lifecycle steps,
What are the data security controls,
What is the data destruction methods
17  cards
Domain 3: (Security Architecture and Engineering)
What treats user identity as the ...,
What represents a default config ...,
What indicates that components sh...
158  cards
Domain 4: (Communication & Network Security)
What enables network segmentation...,
What enables the network to be in...,
What are some vulnerabilities for...
119  cards
Domain 5: Identity and Access Management
What has both a public and privat...,
What is a client to a radius serv...,
What uses udp and encrypts the pa...
34  cards
Domain 6: (Security Assessment and Testing)
What are some tools of security a...,
What uses automated tools to sear...,
What uses the same tools as vulne...
11  cards
Domain 7: (Security Operations)
What used to create a threat mode...,
What it security principles help ...,
What helps prevents collusion wit...
65  cards
Domain 8: (Software Development Security)
What can improve application secu...,
What eva,
What will improve recoverability ...
51  cards
Chapter 1
When evaluating a third party for...,
What time is responsible for clas...,
What role is responsible for perf...
5  cards
Chapter 2
What is a formal evaluation to en...,
What assess the key indicators an...,
What are the levels of the risk m...
10  cards
Chapter 3
What step of the bcp process focu...,
What step of the bcp process focu...,
What are the steps of the busines...
8  cards
Chapter 4
What requires senior executives t...,
What act requires that gov agenci...,
What act charges nist with respon...
13  cards
Chapter 5
What physical security control de...,
What are three different ways to ...,
What method is a combination of h...
17  cards
Chapter 6
What principle states that a cryp...,
What standard defines the hardwar...,
What boolean mathmatics operation...
41  cards
Chapter 7
What is the most popular and wide...,
What uses large integers and modu...,
What cryptographic algorithm doub...
63  cards
Chapter 8
What type of exception handling t...,
What term describes where a syste...,
What term describes that when a s...
37  cards
Chapter 9
What describes where multiple con...,
What ring has the highest level o...,
What ring deals with the various ...
84  cards
Chapter 10
What is a systematic effort to id...,
What is the tendency for various ...,
What addresses facility design la...
37  cards
Chapter 11
What is the addition of a header ...,
What is the container name for os...,
What is the container name for os...
83  cards
Chapter 12
What ppp protocol transmits usern...,
What performs authentication usin...,
What allows customized authentica...
21  cards
Chapter 13
What includes knowledge based aut...,
How do you establish identity for...,
What provides accountability
24  cards
Chapter 14
What are common authorization mec...,
What access control model is wher...,
What is commonly referred to as a...
20  cards
Chapter 15
What provides an important mechan...,
What uses automated tools to sear...,
What takes the results of test in...
50  cards
Chapter 16
What provides customers with a co...,
What model provide basic computin...,
What ensures that systems are con...
17  cards
Chapter 17
What stages in the incident manag...,
What are common basic preventativ...,
What provide a list of approved s...
24  cards
CISSP Learn App Flash Cards
What documentation determines the...,
What stage of the sw cmm is usual...,
What stage of the sw cmm is where...
52  cards

More about
CISSP

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Elijah Turner's CISSP flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CISSP
  • 10 decks
  • 822 flashcards
  • 481 learners
Decks: Access Control, Telecommunications And Network Security, Information Security Governance And Risk, And more!
CISSP ISC2 2023
  • 90 decks
  • 3704 flashcards
  • 43 learners
Decks: Cissp Glossary, Cissp Lesson 1 Pretest, Domain 1 Access Control, And more!
CISSP
  • 22 decks
  • 1024 flashcards
  • 117 learners
Decks: Introduction, Chapter 1 Access Control, Chapter 2 Access Control Attacks And Mon, And more!
CISSP + Exams
  • 16 decks
  • 2148 flashcards
  • 194 learners
Decks: Security Management Practices, Security Architecture And Models, Access, And more!
Make Flashcards