CSIT 161 Chapter 14 Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

How many domains of knowledge are covered by the Certified Information Systems Security Professional (CISSP) exam?

8

Jiang is pursuing a career in information security. He wants to eventually achieve the (ISC)^2 Certified Information Systems Security Professional (CISSP) certification but does not have the required experience. If he passes the CISSP exam now, which credential will Jiang get?

Associate of (ISC)^2

Hajar has been an (ISC)2 Certified Information Systems Security Professional (CISSP) for 10 years. She would like to earn an advanced certification that demonstrates her ability in systems security engineering. Which of the following CISSP concentrations would meet Hajar's needs?

CISSP-ISSEP

Richard would like to earn a certification that demonstrates his ability to manage enterprise security programs. What certification would be most appropriate for Richard?

Certified Information Security Manager (CISM)

Which of the following certifications cannot be used to satisfy the security credential requirements for the advanced Certified Internet Web Professional (CIW) certifications?

Certified Information Security Manager (CISM)

What certification focuses on information systems audit, control, and security professionals?

Certified Information Systems Auditor (CISA)

Which of the following certifications is considered the flagship International Information Systems Security Certification Consortium (ISC)^2 certification and targets middle- and senior-level managers?

Certified Information Systems Security Professional (CISSP)

Colin is a software developer. He would like to earn a credential that demonstrates to employers that he is well educated on software security issues. What certification would be most suitable for this purpose?

Certified Secure Software Lifecycle Professional (CSSLP)

Maria is an IT security professional for a large health care corporation. She has been working with the compliance team on a few projects and is expanding her skills to include risk management as well as control and assurance activities. What ISACA certification would be the best fit?

Certified in Risk and Information Systems Control (CRISC)

Jim is an experienced security professional who recently accepted a position in an organization that uses Check Point firewalls. What certification can Jim earn to demonstrate his ability to administer these devices?

Check Point Certified Security Administrator (CCSA)

Oscar is a network engineer. He is responsible for the networks and security protections, such as firewalls, in his local government agency. He is beginning a professional development journey and trying to determine an entry-level or associate-level security certification that is a good match with his current knowledge and skills. Which certification should he pursue?

Cisco Certified Network Associate (CCNA)

Helen has no security experience. She would like to earn a certification that demonstrates that she has the basic knowledge necessary to work in the information security field. What certification would be an appropriate first step for her?

CompTIA Security+

Which of the following provides IT and communications support to the White House, Secretary of Defense, and all military sectors that contribute to the defense of the United States of America?

Defense Information Systems Agency (DISA)

Juan is an experienced information security professional. He has spent a lot of time evaluating computers for evidence of criminal or malicious activity as well as recovering data. Which Global Information Assurance Certification (GIAC) credential focus area is most likely to have certifications that are a good fit for Juan's skills and knowledge?

Digital Forensics & Incident Response

Which of the following is not true of U.S. Department of Defense/military Directive (DoDD) 8140?

DoDD 8140 certifications are unique and will not include commercial certifications.

Which certification program enables credential holders to earn a Gold credential through the acceptance of a technical paper that covers an important area of information security?

Global Information Assurance Certification (GIAC)

What organization offers a variety of security certifications that are focused on the requirements of auditors?

ISACA

Fran is interested in learning more about the popular Certified Ethical Hacker (CEH) credential. What organization should she contact?

International Council of E-Commerce Consultants (EC-Council)

Which certification is not a top-level certification in its program?

Juniper Networks Certified Internet Professional (JNCIP)-Security

Ben is working toward a position as a senior security administrator. He would like to earn his first International Information Systems Security Certification Consortium (ISC)^2 certification. Which certification is most appropriate for his needs?

Systems Security Certified Practitioner (SSCP)


Conjuntos de estudio relacionados

Business In Society Midterm Review

View Set

WPC150: MH-Read: SCM - Chapters 3 (sections), 9, and 15

View Set

Информатика ЕНТ подготовка 2023

View Set

Ratio and Measures for Working Capital Management

View Set

Chemistry - Periodic Trends - Chapter Review

View Set

Module 49 Introduction to Psychological Disorders

View Set