ECE Fund of Cybersecurity and Info Security: Ch 13 and 14
Which of the following is NOT an advantage to undertaking self-study of information security topics? Fixed pace Low cost Self-motivation Flexible materials
Fixed pace
DoD and NSA have adopted several training standards to serve as a pathway to satisfy Directive 8140. Although they are called standards, they are really training requirements for specific job responsibilities. True or False
True
Juniper Networks offers vendor-specific certifications. True or False
True
Many security training courses specifically prepare students for certification exams. True or False
True
Continuing professional education (CPE) credits typically represent ________ minutes of classroom time per CPE unit. 120 50 60 30
50
What DoD directive requires that information security professionals in the government earn professional certifications? 8088 8540 8270 8140
8140
________ refers to a program of study approved by the State Department of Education in the state that a school operates. Certificate of completion Continuing education Continuing professional education (CPE) Accredited
Accredited
A professional certification is typically offered as part of an evening curriculum that leads to a certificate of completion. True or False
False
In general, security training programs are identical to security education programs with respect to their focus on skills and in their duration. True or False
False
Symantec offers vendor-neutral certifications as well as certifications for its product lines. True or False
False
The CISSP-ISSEP concentration requires that a candidate demonstrate two years of professional experience in the area of architecture. True or False
False
How many years of post-secondary education are typically required to earn a bachelor's degree in a non-accelerated program? Three Two Six Four
Four
The (ISC)2 Systems Security Certified Practitioner (SSCP) credential covers the seven domains of best practices for information security. True or False
True
Brian is the information security training officer for a health care provider. He wants to develop a training program that complies with the provisions of Health Insurance Portability and Accountability Act (HIPAA). Which of the following topics must be included? Prescribing procedures Password management Medical records formats Patient safety
Password management
Which of the following certifications CANNOT be used to satisfy the security credential requirements for the advanced Certified Internet Webmaster (CIW) certifications? GIAC Certified Firewall Analyst (GCFW) Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) Security+
Certified Information Security Manager (CISM)
A security awareness program that focuses on an organization's Bring Your Own Device (BYOD) policy is designed to cover the use of what type of equipment? Servers Workstations Personally owned devices Printers
Personally owned devices
Security training programs typically differ from security education programs in their focus on ______________. theoretical models hands-on skills security topics academic courses
hands-on skills
Rod has been a Certified Information Systems Security Professional (CISSP) for 10 years. He would like to earn an advanced certification that demonstrates his ability in information security architecture. Which of the following CISSP concentrations would meet Rod's needs? CISSP-ISASP CISSP-ISSAP CISSP-ISSMP CISSP-ISSEP
CISSP-ISSAP
What organization offers a variety of security certifications that are focused on the requirements of auditors? ISACA International Information Systems Security Certification Consortium, Inc. (ISC)2 Global Information Assurance Certification (GIAC) CompTIA
ISACA
Ben is working toward a position as a senior security administrator and would like to earn his first International Information Systems Security Certification Consortium, Inc. (ISC)2 certification. Which certification is most appropriate for his needs? Certified Secure Software Lifecycle Professional (CSSLP) Certified Information Systems Security Professional (CISSP) Systems Security Certified Practitioner (SSCP) Certified Cloud Security Professional (CCSP)
Systems Security Certified Practitioner (SSCP)