CISSP Power Notes

This class was created by Brainscape user Dola Sang. Visit their profile to learn more about the creator.

Decks in this class (14)

Chapter 6- Cryptography and Symmetric Key Algorithms
List the goals of cryptography,
3 states at which data must remai...,
Most common goal of cryptosystems
61  cards
Chapter 7: PKI and Cryptographic Applications
Explain merkle hellman knapsack,
What is the importance of key length,
List some assymetric cryptosystems
75  cards
Chapter 8- Security Models, Design and Capabilities
Controlling access to a resource ...,
Systems are built and designed ac...,
Open source vs closed source
57  cards
Chapter 9- Security Vulnerabilities, Threats and Countermeasures
1 what is hardware,
2 what do you understand by the p...,
3 list execution types
49  cards
Chapter 9- Security Vulnerabilities, Threats and Countermeasures
50 explain ultraviolet eproms uve...,
51 explain electronically erasabl...,
52 define flash memory
195  cards
Chapter 10- Physical Security Requirements
1 what are first line of defence,
2 what is a secure facility plan,
3 what is critical path analysis
124  cards
Chapter 11- Secure Network Architecture and Securing Network Components
1 what is protocol,
2 osi model divides networking in...,
3 what is encapsulation
308  cards
Chapter 12- Secure Communications and Network Attacks
1 list some protocols that provid...,
2 describe ipsec,
3 describe kerberos
107  cards
Chapter 13- Managing Identity and Authentication (IAM)
1 what is a subject,
2 subject can be,
3 list company assets
85  cards
Chapter 14: Controlling and Monitoring Access
1 what are permissions,
2 what are rights,
3 what are privileges
54  cards
Chapter 15- Security Assessment and Testing
1 what is security testing,
2 what is testing strategy,
3 what is security assessment
74  cards
Chapter 17- Preventing and Responding to Incidents
1 what is the primary goal of inc...,
2 what is an incident,
3 what is security incident
98  cards
Chapter 19- Investigations and Ethics
1 what are administrative policies,
2 what is root cause analysis,
3 what is admissible evidence
19  cards
Chapter 20- Software Development Security
1 once programmers are ready to e...,
2 what is compiler,
3 examples of compiled languages are
61  cards

More about
CISSP Power Notes

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Dola Sang's CISSP Power Notes flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CISSP
  • 10 decks
  • 822 flashcards
  • 482 learners
Decks: Access Control, Telecommunications And Network Security, Information Security Governance And Risk, And more!
Brain Power: Adam and Victor's Neurology
  • 19 decks
  • 1636 flashcards
  • 215 learners
Decks: Peripheral Nerve, Spinal Cord, Mg Guidelines, And more!
► Med Notes 2
  • 19 decks
  • 6664 flashcards
  • 156 learners
Decks: Cardiology, Pulmonology, Neurology, And more!
CISSP ISC2 2023
  • 90 decks
  • 3704 flashcards
  • 43 learners
Decks: Cissp Glossary, Cissp Lesson 1 Pretest, Domain 1 Access Control, And more!
Make Flashcards