This class was created by Brainscape user Sad Summertron. Visit their profile to learn more about the creator.

Decks in this class (19)

Chapter 3: Business Continuity Planning
What are the 4 main steps of bcp,
What is bcp business continuity p...,
What is the most significant reso...
34  cards
Chapter 4: Laws, Regulations, and Compliance
The laws that the police and othe...,
Laws designed to provide for an o...,
Laws that covers topics as mundan...
44  cards
Chapter 5: Protecting Security of Assets
Any data that helps an organizati...,
Value of the data to the organiza...,
Unauthorized disclosure of which ...
45  cards
Chapter 6: Cryptography and Symmetric Key Algorithms
Uses a shared secret key availabl...,
Use individual combinations of pu...,
True or false codes work on words...
36  cards
Chapter 7: PKI and Cryptographic Applications
Public key cryptosystems assign e...,
Y2 x3 ax b,
An approach to key exchange that ...
17  cards
Chapter 8: Principles of Security Models, Design, and Capabilities
The active entity that makes a re...,
The passive entity that the subje...,
The concept that if a trusts b an...
54  cards
Chapter 9: Security Vulnerabilities, Threats, and Countermeasures
The security design principle tha...,
An initiative by the department o...,
Any tangible part of a computer t...
63  cards
Chapter 10: Physical Security Requirements
A ______ plan outlines the securi...,
_____ is a systematic effort to i...,
_______ is the tendency for vario...
11  cards
Chapter 11: Secure Network Architecture and Components
Telnet port,
Ftp port,
Tftp port
35  cards
Chapter 12: Secure Communications and Network Attacks
____is a data link layer protocol...,
______ is a telephone switching o...,
_____ is the process of removing ...
15  cards
Chapter 13: Managing Identity and Authentication
Authorization indicates who is tr...,
Auditing is the process of tracki...,
A ____device or hardware token is...
9  cards
Chapter 14: Controlling and Monitoring Access
In general ____refer to the acces...,
A ___ primarily refers to the abi...,
The ____ principle ensures that a...
20  cards
Chapter 15: Security Assessment and Testing
_____ assessment and testing prog...,
Security ___ verify that a contro...,
Security ____ are comprehensive r...
46  cards
Chapter 16: Managing Security Operations
The _____ principle imposes the r...,
The ______ principle states that ...,
_____ and responsibilities ensure...
12  cards
Chapter 17: Preventing and Responding to Incidents
An ____ is any event that has a n...,
Incident managemnet steps,
A ____control attempts to thwart ...
16  cards
Chapter 18: Disaster Recovery Planning
This is also called striping,
This is also called mirroring it ...,
This is also called striping with...
8  cards
Chapter 19: Investigations and Ethics
0  cards
Chapter 20: Software Development Security
0  cards
Chapter 21: Malicious Code and Application Attacks
___ viruses use more than one pro...,
____ viruses hide themselves by a...,
Polymorphic viruses actually modi...
12  cards

More about
cissp osg

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Sad Summertron's CISSP OSG flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CISSP ISC2 2023
  • 90 decks
  • 3704 flashcards
  • 36 learners
Decks: Cissp Glossary, Cissp Lesson 1 Pretest, Domain 1 Access Control, And more!
CISSP
  • 22 decks
  • 1024 flashcards
  • 114 learners
Decks: Introduction, Chapter 1 Access Control, Chapter 2 Access Control Attacks And Mon, And more!
CISSP ISC2 EXAM
  • 74 decks
  • 3542 flashcards
  • 28 learners
Decks: Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, And more!
CISSP + Exams
  • 16 decks
  • 2148 flashcards
  • 189 learners
Decks: Security Management Practices, Security Architecture And Models, Access, And more!
Make Flashcards