This class was created by Brainscape user George Jenson. Visit their profile to learn more about the creator.

Decks in this class (21)

Chpt 2
What is the equation for ale,
What is the equation for safeguar...,
What are the 6 administrative con...
13  cards
Book 11 Hour
What does dep stand for,
What does aslr stand for
2  cards
Chpt 21
What are the 4 propagation techni...,
What is another name for time of ...,
What is a sign that an ip address...
10  cards
Chpt 20
What are candidate keys,
What is a primary key,
What are foreign keys
10  cards
Chpt 18
What is another name for a databa...,
What is the typical time estimate...,
What does the term 100 year flood...
6  cards
Chpt 19
What are the 6 categories of comp...,
What kind of evidence are server ...,
What drives hacktivists
7  cards
Chpt 17
What are the 7 steps of incident ...,
What is another word for containment,
What kind of security control is ...
4  cards
Chpt 15
What port status represents signi...,
What subnet mask would scan all s...,
What port do servers usually run ...
18  cards
Chpt 14
Define permissions,
What do privileges mean,
What is another name for dac
6  cards
Chpt 12
What is ipsec,
What is needed to allow an outsid...,
L2f l2tp and pptp all lack what
4  cards
Chpt 13
Define asset,
What are the three primary contro...,
What are the four other access co...
11  cards
Chpt 11
What are the four tcp ip layers,
What are the 7 osi model levels,
What does eap stand for
10  cards
Chpt 10
What are the functional order of ...,
List the three types of security ...,
What is the best type of water ba...
8  cards
Chpt 9
What is it called when an os allo...,
What is the difference between a ...,
What is the primary building bloc...
5  cards
Chpt 8
What is the process called when t...,
What is the process called when a...,
What is confinement
20  cards
Chpt 7
Which algorithm is based on the i...,
What does sha stand for,
What is the hash value length for...
12  cards
Chpt 6
What are the 4 goals of cryptography,
What does this symbol mean in boo...,
What does this symbol mean in boo...
14  cards
Chpt 5
Define purging,
Define data remanence,
What type of encryption does linu...
5  cards
Chpt 4
What are the three major categori...,
What does the computer fraud and ...,
What does the electronics privacy...
10  cards
Chpt 3
What are the 4 phases of buisness...,
What is the first step people res...,
What type of measurement should b...
9  cards
Chpt 1
How does authorization fit into a...,
What is the importance of account...,
What are the 8 primary security r...
6  cards

More about
New CISSP

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study George Jenson's New CISSP flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

CISSP
  • 10 decks
  • 822 flashcards
  • 481 learners
Decks: Access Control, Telecommunications And Network Security, Information Security Governance And Risk, And more!
CISSP ISC2 2023
  • 90 decks
  • 3704 flashcards
  • 43 learners
Decks: Cissp Glossary, Cissp Lesson 1 Pretest, Domain 1 Access Control, And more!
CISSP
  • 22 decks
  • 1024 flashcards
  • 117 learners
Decks: Introduction, Chapter 1 Access Control, Chapter 2 Access Control Attacks And Mon, And more!
CISSP + Exams
  • 16 decks
  • 2148 flashcards
  • 194 learners
Decks: Security Management Practices, Security Architecture And Models, Access, And more!
Make Flashcards