CISSP ISC2 EXAM

This class was created by Brainscape user Yuvaraj P N. Visit their profile to learn more about the creator.

Decks in this class (74)

CISSP Practice Questions - All CISSP Domains 120Q - 2022 #2 (1 of 2 / Anthony Today)
Network communications rely on th...,
Darielle is an information securi...,
Melinda selects a disaster recove...
60  cards
CISSP Practice Questions - All CISSP Domains 120Q - 2022 #2 (2 of 2 / Anthony Today)
Michmich is helping a user who se...,
Zoe changes the mac address of he...,
With the growing adoption of clou...
60  cards
CISSP Practice Questions - All CISSP Domains 120Q - 2022 #1 (1 of 2 / Anthony Today)
You are expected to give a networ...,
Bertrand has a set of sensitive d...,
Sasha recently joined the cyberse...
60  cards
CISSP Practice Questions - All CISSP Domains 120Q - 2022 #1 (2 of 2 / Anthony Today)
As a security consultant for a la...,
You are working on a business con...,
Fred needs to transfer files betw...
60  cards
CISSP Practice Questions - All CISSP Domains 120Q - 2022 #3 (1 of 2 / Anthony Today)
What topology would accurately de...,
Which of the following activities...,
What software development model w...
60  cards
CISSP Practice Questions - All CISSP Domains 120Q - 2022 #3 (2 of 2 / Anthony Today)
You and your team are in charge o...,
What application security process...,
Albert is the security expert for...
60  cards
CISSP certification: Full 125 question practice test #4 - test 1 (Anthony Today)
Looking at the logical ring model...,
In software testing we are doing ...,
During a security audit we found ...
125  cards
CISSP certification: Full 125 question practice test #4 - test 2 (Anthony Today)
Which historical type of encrypti...,
In our authentication process we ...,
What would a distance vector rout...
125  cards
CISSP Practice Test Chapter 1 Security and Risk Management (Sybex)
Alyssa is responsible for her org...,
Gavin is creating a report to man...,
Francine is a security specialist...
100  cards
CISSP Practice Test Chapter 2 Asset Security (Sybex)
Angela is an information security...,
Control objectives for informatio...,
Nadia s company is operating a hy...
100  cards
CISSP Practice Test Chapter 3 Security Architecture and Engineering (Sybex)
Matthew is the security administr...,
Referring to the figure shown her...,
Ralph is designing a physical sec...
101  cards
CISSP Practice Test Chapter 4 Communication and Network Security (Sybex)
Gary wants to distribute a large ...,
During a security assessment of a...,
Ben has connected his laptop to h...
100  cards
CISSP Practice Test Chapter 5 Identity and Access Management (Sybex)
Which of the following is best de...,
Jim s organization wide implement...,
Which of the following is not a w...
100  cards
CISSP Practice Test Chapter 6 Security Assessment and Testing (Sybex)
During a port scan susan discover...,
Which of the following is a metho...,
During a port scan naomi found tc...
100  cards
CISSP Practice Test Chapter 7 Security Operations (Sybex)
Mary is reviewing the availabilit...,
Joe is the security administrator...,
Tim is configuring a privileged a...
100  cards
CISSP Practice Test Chapter 8 Software Development Security (Sybex)
Susan provides a public restful a...,
Darren is conducting a threat hun...,
Which one of the following statem...
100  cards
Chapter 9 Practice Test 1 (Sybex)
Lisa is attempting to prevent her...,
Ed has been tasked with identifyi...,
Fran is building a forensic analy...
126  cards
Chapter 10 Practice Test 2 (Sybex)
James is building a disaster reco...,
In his role chris is expected to ...,
Alex is preparing to solicit bids...
125  cards
Chapter 11 Practice Test 3 (Sybex)
Fred s data role requires him to ...,
Sally is using ipsec s esp compon...,
Which one of the following is not...
125  cards
Chapter 12 Practice Test 4 (Sybex)
What type of access control is in...,
Which one of the following presen...,
Ben s organization is adopting bi...
125  cards
CISSP Sybex Official Study Guide Chapter 1 Review Questions
Which of the following contains t...,
Vulnerabilities and risks are eva...,
Which of the following is a princ...
20  cards
CISSP Sybex Official Study Guide Chapter 2 Review Questions
Which of the following is the wea...,
When seeking to hire new employee...,
Which of the following is a prima...
20  cards
CISSP Sybex Official Study Guide Chapter 3 Review Questions
What is the first step that indiv...,
Once the bcp team is selected wha...,
What is the term used to describe...
20  cards
CISSP Sybex Official Study Guide Chapter 4 Review Questions
Which criminal law was the first ...,
Which law governs information sec...,
What type of law does not require...
20  cards
CISSP Sybex Official Study Guide Chapter 5 Review Questions
Which one of the following identi...,
When determining the classificati...,
Which of the following answers wo...
20  cards
CISSP Sybex Official Study Guide Chapter 6 Review Questions
How many possible keys exist in a...,
John recently received an email m...,
What is the length of the cryptog...
20  cards
CISSP Sybex Official Study Guide Chapter 8 Review Questions
What is system certification 1,
What is system accreditation 2,
What is a closed system 3
20  cards
CISSP Sybex Official Study Guide Chapter 9 Review Questions
Many pc operating systems provide...,
What technology provides an organ...,
You have three applications runni...
20  cards
CISSP Sybex Official Study Guide Chapter 10 Review Questions
Which of the following is the mos...,
What method can be used to map ou...,
What infrastructure component is ...
20  cards
CISSP Sybex Official Study Guide Chapter 11 Review Questions
What is layer 4 of the osi model 1,
What is encapsulation 2,
Which osi model layer manages com...
20  cards
CISSP Sybex Official Study Guide Chapter 12 Review Questions
___________________ is a layer 2 ...,
Tunnel connections can be establi...,
___________________ is a standard...
20  cards
CISSP Sybex Official Study Guide Chapter 13 Review Questions
Which of the following would not ...,
Which of the following is true re...,
Which of the following types of a...
20  cards
CISSP Sybex Official Study Guide Chapter 14 Review Questions
Which of the following best descr...,
What is the intent of least privi...,
A table includes multiple objects...
20  cards
CISSP Sybex Official Study Guide Chapter 20 Review Questions
Which one of the following tools ...,
Adam recently ran a network port ...,
Which one of the following factor...
20  cards
CISSP Sybex Official Study Guide Chapter 16 Review Questions
An organization ensures that user...,
An administrator is granting perm...,
Which of the following statements...
4  cards
CISSP Sybex Official Study Guide Chapter 15 Review Questions
Which one of the following tools ...,
Adam recently ran a network port ...,
Which one of the following factor...
20  cards
CISSP Sybex Official Study Guide Chapter 16 Review Questions COPY
An organization ensures that user...,
An administrator is granting perm...,
Which of the following statements...
20  cards
CISSP Sybex Official Study Guide Chapter 17 Review Questions
Which of the following is the bes...,
Which of the following would secu...,
Which of the following are dos at...
20  cards
CISSP Sybex Official Study Guide Chapter 18 Review Questions
What is the end goal of disaster ...,
Which one of the following is an ...,
According to the federal emergenc...
20  cards
CISSP Sybex Official Study Guide Chapter 19 Review Questions
What is a computer crime 1,
What is the main purpose of a mil...,
What type of attack targets propr...
20  cards
CISSP Sybex Official Study Guide Chapter 20 Review Questions COPY
Which one of the following is not...,
Bob is developing a software appl...,
What portion of the change manage...
11  cards
Pocket Prep
Which of the following best descr...,
An attacker attempts to break int...,
An organization must consider all...
143  cards
Access Control
All of the following are needed f...,
Which of the following is true re...,
A large table includes multiple s...
36  cards
Telecommunications and Network Security
A vpn can be established over whi...,
Which of the following ip address...,
Which of the following is not an ...
46  cards
Information Security Guidelines and Risk Managerment
When seeking to hire new employee...,
Which of the following describes ...,
Which of the following is typical...
44  cards
Software Development Security
What is the value of the logical ...,
In systems utilizing a ring prote...,
Which one of the following terms ...
27  cards
Cryptography
What does ipsec define 2,
What is the minimum number of cry...,
What is the length of the cryptog...
42  cards
Video Content Lesson 1
Security triad 2,
Confidentiality 3,
Confidentiality 4
49  cards
Security Architecture and Design
Which database security risk occu...,
What is a security perimeter choo...,
How many major categories do the ...
63  cards
Video Content Lesson 2
Access control 2,
Least privilege 3,
Accountability 4
46  cards
CISSP Lesson 1 PreTest
What is a threat a any weakness i...,
According to rfc 1087 which actio...,
The annual loss expectancy equati...
18  cards
CISSP Lesson 2 PreTest
Which is not a criterion for clas...,
A host based intrusion detection ...,
Which is an example of an adminis...
17  cards
Video Content Lesson 3
Julius caesar s cryptography was ...,
Famous german encryption machine 3,
Japanese encryption machine 4
49  cards
Security Operations
Which of the following activities...,
Of the following choices what is ...,
You need to ensure a service prov...
38  cards
Video Content Lesson 4
Physical security 2,
Threats 1 5 3,
Threats 6 9 4
30  cards
Business Continuity and Disaster Recovery
You are concerned about the risk ...,
What unit of measurement should b...,
In which one of the following dat...
41  cards
Video Content Lesson 5
Organization 2,
Computer hardware types 3,
Cpu 4
50  cards
Legal Regulations Investigation and Compliance
What is the standard duration of ...,
Why are military and intelligence...,
What type of law does not require...
44  cards
Physical Environmental Security
At what voltage level can static ...,
What type of physical security co...,
Which of the following is typical...
22  cards
Video Content Lesson 6
Business continuity plans project...,
Industry and professional standar...,
Legislative compliance 4
38  cards
Video Content Lesson 7
Osi reference model 2,
Protocols 3,
Standards organizations 4
46  cards
Video Content Lesson 8
Network devices 2,
Hubs 3,
Bridges 4
42  cards
Video Content Lesson 9
Application issues 2,
Software development 3,
Application environments 4
55  cards
Video Content Lesson 10
Administrative management 2,
Overview 3,
Duty separation 4
45  cards
Video Content Lesson 11
Question 1,
Types of computer crime 2,
Overview 3
48  cards
CISSP Lesson 3 PreTest
Which is a characteristic of symm...,
Cryptography does not provide int...,
What do digital signatures ensure 4
19  cards
CISSP Lesson 4 PreTest
Which type of threat is every com...,
Which is an administrative control 3,
Which type of control dictates po...
15  cards
CISSP Lesson 5 PreTest
Subjects should have least privil...,
Which category defined in the tru...,
Hardware is any tangible part of ...
20  cards
CISSP Lesson 6 PreTest
Which data center site takes the ...,
What happens during a full interr...,
Who should be on the bcp team cho...
15  cards
CISSP Lesson 7 PreTest
Which vpn protocol provides mutua...,
Which organization created the se...,
Which cable standards can be used...
18  cards
CISSP Lesson 8 PreTest
Which is a function of a gateway 2,
A dos attack is typically against...,
Which statement describes the has...
20  cards
CISSP Lesson 9 PreTest
A pda has which kind of memory 2,
Network isolation is an example o...,
Which statements are true concern...
20  cards
CISSP Lesson 10 PreTest
How often should monitoring be im...,
Which is the best countermeasure ...,
What is the purpose of separation...
15  cards
CISSP Lesson 11 PreTest
Which statement is true regarding...,
In order for evidence to be admis...,
Which was introduced in the compu...
14  cards

More about
CISSP ISC2 EXAM

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Yuvaraj P N's CISSP ISC2 EXAM flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CISSP ISC2 2023
  • 90 decks
  • 3704 flashcards
  • 54 learners
Decks: Cissp Glossary, Cissp Lesson 1 Pretest, Domain 1 Access Control, And more!
CISSP Exam
  • 32 decks
  • 1092 flashcards
  • 2662 learners
Decks: Access Control, Telecommunications And Network Security, Information Security Guidelines And Risk, And more!
CISSP
  • 43 decks
  • 2470 flashcards
  • 687 learners
Decks: Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, And more!
Make Flashcards