FISS Chapter 14

¡Supera tus tareas y exámenes ahora con Quizwiz!

How many years of specialized experience are required to earn one of the Certified Information Systems Security Professional (CISSP) concentrations?

Two

Which of the following is NOT a role described in DoD Directive 8140, which covers cybersecurity training?

Attack

Richard would like to earn a certification that demonstrates his ability to manage the information security function. What certification would be most appropriate for Richard?

Certified Information Security Manager (CISM)

What certification focuses on information systems, audit, control and security professionals?

Certified Information Systems Auditor (CISA)

Which of the following certifications is considered the flagship Information Systems Security Certification Consortium, Inc. (ISC) certification and the gold standard for information security professionals?

Certified Information Systems Security Professional (CISSP)

Colin is a software developer. He would like to earn a credential that demonstrates to employers that he is well educated on software security issues. What certification would be most suitable for this purpose?

Certified Secure Software Lifecycle Professional (CSSLP)

Which of the following Cisco certifications demonstrates the most advanced level of security knowledge?

Cisco Certified Internetwork Expert (CCIE) Security

Jonas is an experienced information security professional with a specialized focus on evaluating computers for evidence of criminal or malicious activity and recovering data. Which GIAC certification would be most appropriate for Jonas to demonstrate his abilities?

GIAC Certified Forensic Examiner (GCFE)

Fran is interested in learning more about the popular Certified Ethical Hacker (CEH) credential. What organization should she contact?

International Council of E-Commerce Consultants (EC-Council)

Helen has no experience in security. She would like to earn a certification that demonstrates that she has the basic knowledge necessary to work in the information security field. What certification would be an appropriate first step for her?

Security+


Conjuntos de estudio relacionados

Leveraging IS in Business Practice Exam 2

View Set

Iggy Chapter 26: Care of Patients with Burns

View Set

Chapter 8 - Organization Structure & Design

View Set

Chapter 35 Geriatric Emergencies

View Set

Chapter 25 Asepsis and Infection Control

View Set

Business management review chapter 8 test

View Set