ISC2 - Study Notes

This class was created by Brainscape user Bijan Fardjad. Visit their profile to learn more about the creator.

Decks in this class (28)

ISC2 - Study Notes 1
You can also use audit logging fo...,
Uses multiple servers and ensures...,
Is a security principle that ensu...
10  cards
ISC2 Study Notes 2
This setting remembers previous p...,
This setting defines how long use...,
This setting defines when users m...
10  cards
ISC2 - Study Notes 3
A token using an asynchronous dyn...,
The goal of both opie and s key i...,
Includes data electronically embe...
10  cards
ISC2 - Study Notes 4
Provides sso to different operati...,
The principal is typically the us...,
Provides sso for web based applic...
10  cards
ISC2 - Study Notes 5
Another method is device fingerpr...,
A user requesting a web page from...,
Time remote access attribute loca...
10  cards
ISC2 - Study Notes 6
Administrators create rules that ...,
Is a more sophisticated type of r...,
Both the clark wilson model and t...
10  cards
ISC2 - Study Notes 7
Refers to the privileges granted ...,
Removing a user from a group imme...,
Refers to disabling and deleting ...
10  cards
ISC2 - Study Notes 8
Supports many additional security...,
Ethernet networks support carrier...,
Also support request to send rts ...
10  cards
ISC2 - Study Notes 9
A host record resolves a host nam...,
Is used for ipv4 multicasting whe...,
Transport layer tls creates the i...
10  cards
ISC2 - Study Notes 10
In some instances an attacker is ...,
Compared to bluesnarfing and blue...,
Security vlans separate traffic f...
10  cards
ISC2 - Study Notes 11
Provides mutual authentication of...,
An ssl vpn uses port 443 and allo...,
Pap is an older authentication pr...
10  cards
ISC2 - Study Notes 12
The data plane sometimes called t...,
Vm escape is a known attack again...,
Is sometimes called hardware as a...
10  cards
ISC2 - Study Notes 13
Attempts to gather information on...,
An attacker performs a large numb...,
Is another sophisticated attack w...
10  cards
ISC2 - Study Notes 14
Vendors that release software pur...,
A buffer overflow problem starts ...,
An attacker attempts to insert op...
10  cards
ISC2 - Study Notes 15
Uses code to make it difficult fo...,
A virus actually mutates the code...,
Provides an attacker with control...
10  cards
ISC2 - Study Notes 16
Is an extension of both spf and d...,
Is a device that filters traffic ...,
Helps reduce malware infections b...
10  cards
ISC2 - Study Notes 17
Gain permissions perform vulnerab...,
The cost of a control is justifie...,
1 select security controls the ev...
10  cards
ISC2 - Study Notes 18
Perimeter barriers such as fences...,
Policies are authoritative in nat...,
Bcp helps an organization prepare...
10  cards
ISC2 - Study Notes 19
Uses three or more drives in an a...,
Can survive the failure of two di...,
Allow a service to continue to op...
10  cards
ISC2 - Study Notes 20
In general marking refers to usin...,
Management personnel in managemen...,
Have primary responsibility for p...
10  cards
ISC2 - Study Notes 21
Within a database are known as tu...,
Is a virtual table that provides ...,
Act of 2002 mandates specific pro...
10  cards
ISC2 - Study Notes 22
Losses refer to the immediate los...,
Administrators can create warning...,
Security policies should be revie...
10  cards
ISC2 - Study Notes 23
A cold site is a building with a ...,
Indicates that risk management pr...,
Risk informed this tier indicates...
10  cards
ISC2 - Study Notes 24
Protect society the common good n...,
Is a politically motivated attack...,
Used as a security practice can r...
10  cards
ISC2 - Study notes 25
Tls uses asymmetric encryption to...,
Is one of the first public key al...,
Secure multipurpose internet mail...
10  cards
ISC2 - Study Notes 26
Pgp gpg and openpgp support a web...,
Allows organizations with a priva...,
Refers to creating strong keys st...
10  cards
ISC2 - Stdy Notes 27
Identify the need for the system ...,
Development acquisition design pu...,
Install configure and test the sy...
5  cards
ISC2 - Study Notes 28
Clark wilson provides,
Star integrity axiom,
Simple security ss property
4  cards

More about
ISC2 - Study Notes

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Bijan Fardjad's ISC2 - Study Notes flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CISSP ISC2 EXAM
  • 74 decks
  • 3542 flashcards
  • 39 learners
Decks: Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, Cissp Practice Questions All Cissp Domai, And more!
► Med Notes
  • 62 decks
  • 26035 flashcards
  • 539 learners
Decks: Urinary Disorder, Urinary Disorder Part 2, Skin Hair And Nails, And more!
German Studies
  • 41 decks
  • 12847 flashcards
  • 311 learners
Decks: Business, Employment, Finance, And more!
CISSP ISC2 2023
  • 90 decks
  • 3704 flashcards
  • 44 learners
Decks: Cissp Glossary, Cissp Lesson 1 Pretest, Domain 1 Access Control, And more!
Make Flashcards