Chapter 1 - Becoming a CISSP Flashcards

1
Q

What are some reasons for attaining a CISSP certification?

A

1) To meet the growing demand and to thrive in an ever-expanding field
2) To broaden your current knowledge of security concepts and practices
3) To bring security expertise to your current occupation
4) To become more marketable in a competitive workforce
5) To show a dedication to the security discipline
6) To increase your salary and be eligible for more employment opportunities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does CBK stand for in CISSP CBK?

A

Common Body of Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How many domains does the CISSP exam cover?

A

10 domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many questions are on the CISSP exam?

A

250 multiple choice questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does (ISC)2 stand for?

A

International Information Systems Security Certification Consortium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 10 CBK security domains?

A

1) Access Control
2) Telecommunications and Network Security
3) Information Security Governance and Risk Management
4) Software Development Security
5) Cryptography
6) Security Architecture and Design
7) Security Operations
8) Business Continuity and Disaster Recovery Planning
9) Legal, Regulations, Investigations, and Compliance
10) Physical (Environmental) Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What domain examines ways that software should be designed securely?

A

Security Architecture and Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which domain examines the identification of company assets, the proper way to determine the necessary level of protection required and what type of budget to develop for security implementations?

A

Information Security Governance and Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which domain examines computer crimes, laws, and regulations?

A

Legal, Regulations, Investigations, and Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which domain examines mechanisms and methods used to enable administrators and managers to control what subjects can access, the extent of their capabilities after authorization and authentication?

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which domain examines threats, risks, and countermeasures to protect facilities, hardware, data, media, and personnel?

A

Physical (Environmental) Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which domain examines internal, external, public, and private communication systems?

A

Telecommunications and Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which domain examines controls over personnel, hardware, systems, and auditing and monitoring techniques?

A

Security Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which domain examines cryptography techniques, approaches, and technologies?

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which domain examines secure software development approaches, application security, and software flaws?

A

Software Development Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which domain examines the preservation of business activities when faced with disruptions or disasters?

A

Business Continuity and Disaster Recovery Planning