ITC 660 Quiz 14 - Information Security Professional Certification

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

How many domains of knowledge are covered by the CISSP exam?

8

What DoD directive requires that information security professionals in the government earn professional certifications?

8140

Which of the following is NOT a role described in DoD Directive 8140, which covers cybersecurity training?

Attack

Which of the following Cisco certifications demonstrates the most advanced level of security knowledge?

CCIE Security

Jim is an experienced security professional who recently accepted a position in an organization that uses Check Point firewalls. What certification can Jim earn to demonstrate his ability to administer these devices?

CCSA

What certification focuses on information systems audit, control, and security professionals?

CISA

Richard would like to earn a certification that demonstrates his ability to manage the information security function. What certification would be most appropriate for Richard?

CISM

Which of the following certifications cannot be used to satisfy the security credential requirements for the advanced CIW certifications?

CISM

Which of the following certifications is considered the flagship (ISC)2 certification and the gold standard for information security professionals?

CISSP

Rod has been a CISSP for 10 years. He would like to earn an advanced certification that demonstrates his ability in information security architecture. Which of the following CISSP concentrations would meet Rod's needs?

CISSP-ISSAP

Colin is a software developer. He would like to earn a credential that demonstrates to employers that he is well educated on software security issues. What certification would be most suitable for this purpose?

CSSLP

Fran is interested in learning more about the popular CEH credential. What organization should she contact?

EC-Council

Jonas is an experienced information security professional with a specialized focus on evaluating computers for evidence of criminal or malicious activity and recovering data. Which GIAC certification would be most appropriate for Jonas to demonstrate his abilities?

GCFE

What certification organization began as an offshoot of the SANS Institute training programs?

GIAC

What organization offers a variety of security certifications that are focused on the requirements of auditors?

ISACA

What type of security role is covered by the CNSS Training Standard CNSS-4016?

Risk Analysts

Ben is working toward a position as a senior security administrator and would like to earn his first (ISC)2 certification. Which certification is most appropriate for his needs?

SSCP

Helen has no experience in security. She would like to earn a certification that demonstrates that she has the basic knowledge necessary to work in the information security field. What certification would be an appropriate first step for her?

Security+

What type of security role is covered by the CNSS Training Standard CNSS-4012?

Senior System Manager

How many years of specialized experience are required to earn one of the CISSP concentrations?

Two


Set pelajaran terkait

Chapter 67: Management of Patients With Cerebrovascular Disorders Required Competency

View Set

09 - Der Mensch als motivierter Taktiker

View Set

BUSMGT Chapter 20: Inventory management

View Set