Chapter 1 - Becoming a CISSP Flashcards
What are some reasons for attaining a CISSP certification?
1) To meet the growing demand and to thrive in an ever-expanding field
2) To broaden your current knowledge of security concepts and practices
3) To bring security expertise to your current occupation
4) To become more marketable in a competitive workforce
5) To show a dedication to the security discipline
6) To increase your salary and be eligible for more employment opportunities
What does CBK stand for in CISSP CBK?
Common Body of Knowledge
How many domains does the CISSP exam cover?
10 domains
How many questions are on the CISSP exam?
250 multiple choice questions
What does (ISC)2 stand for?
International Information Systems Security Certification Consortium
What are the 10 CBK security domains?
1) Access Control
2) Telecommunications and Network Security
3) Information Security Governance and Risk Management
4) Software Development Security
5) Cryptography
6) Security Architecture and Design
7) Security Operations
8) Business Continuity and Disaster Recovery Planning
9) Legal, Regulations, Investigations, and Compliance
10) Physical (Environmental) Security
What domain examines ways that software should be designed securely?
Security Architecture and Design
Which domain examines the identification of company assets, the proper way to determine the necessary level of protection required and what type of budget to develop for security implementations?
Information Security Governance and Risk Management
Which domain examines computer crimes, laws, and regulations?
Legal, Regulations, Investigations, and Compliance
Which domain examines mechanisms and methods used to enable administrators and managers to control what subjects can access, the extent of their capabilities after authorization and authentication?
Access Control
Which domain examines threats, risks, and countermeasures to protect facilities, hardware, data, media, and personnel?
Physical (Environmental) Security
Which domain examines internal, external, public, and private communication systems?
Telecommunications and Network Security
Which domain examines controls over personnel, hardware, systems, and auditing and monitoring techniques?
Security Operations
Which domain examines cryptography techniques, approaches, and technologies?
Cryptography
Which domain examines secure software development approaches, application security, and software flaws?
Software Development Security