ECE Fund of Cybersecurity and Info Security: Ch 13 and 14

Ace your homework & exams now with Quizwiz!

Which of the following is NOT an advantage to undertaking self-study of information security topics? Fixed pace Low cost Self-motivation Flexible materials

Fixed pace

DoD and NSA have adopted several training standards to serve as a pathway to satisfy Directive 8140. Although they are called standards, they are really training requirements for specific job responsibilities. True or False

True

Juniper Networks offers vendor-specific certifications. True or False

True

Many security training courses specifically prepare students for certification exams. True or False

True

Continuing professional education (CPE) credits typically represent ________ minutes of classroom time per CPE unit. 120 50 60 30

50

What DoD directive requires that information security professionals in the government earn professional certifications? 8088 8540 8270 8140

8140

________ refers to a program of study approved by the State Department of Education in the state that a school operates. Certificate of completion Continuing education Continuing professional education (CPE) Accredited

Accredited

A professional certification is typically offered as part of an evening curriculum that leads to a certificate of completion. True or False

False

In general, security training programs are identical to security education programs with respect to their focus on skills and in their duration. True or False

False

Symantec offers vendor-neutral certifications as well as certifications for its product lines. True or False

False

The CISSP-ISSEP concentration requires that a candidate demonstrate two years of professional experience in the area of architecture. True or False

False

How many years of post-secondary education are typically required to earn a bachelor's degree in a non-accelerated program? Three Two Six Four

Four

The (ISC)2 Systems Security Certified Practitioner (SSCP) credential covers the seven domains of best practices for information security. True or False

True

Brian is the information security training officer for a health care provider. He wants to develop a training program that complies with the provisions of Health Insurance Portability and Accountability Act (HIPAA). Which of the following topics must be included? Prescribing procedures Password management Medical records formats Patient safety

Password management

Which of the following certifications CANNOT be used to satisfy the security credential requirements for the advanced Certified Internet Webmaster (CIW) certifications? GIAC Certified Firewall Analyst (GCFW) Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) Security+

Certified Information Security Manager (CISM)

A security awareness program that focuses on an organization's Bring Your Own Device (BYOD) policy is designed to cover the use of what type of equipment? Servers Workstations Personally owned devices Printers

Personally owned devices

Security training programs typically differ from security education programs in their focus on ______________. theoretical models hands-on skills security topics academic courses

hands-on skills

Rod has been a Certified Information Systems Security Professional (CISSP) for 10 years. He would like to earn an advanced certification that demonstrates his ability in information security architecture. Which of the following CISSP concentrations would meet Rod's needs? CISSP-ISASP CISSP-ISSAP CISSP-ISSMP CISSP-ISSEP

CISSP-ISSAP

What organization offers a variety of security certifications that are focused on the requirements of auditors? ISACA International Information Systems Security Certification Consortium, Inc. (ISC)2 Global Information Assurance Certification (GIAC) CompTIA

ISACA

Ben is working toward a position as a senior security administrator and would like to earn his first International Information Systems Security Certification Consortium, Inc. (ISC)2 certification. Which certification is most appropriate for his needs? Certified Secure Software Lifecycle Professional (CSSLP) Certified Information Systems Security Professional (CISSP) Systems Security Certified Practitioner (SSCP) Certified Cloud Security Professional (CCSP)

Systems Security Certified Practitioner (SSCP)


Related study sets

Chapter 19: Documenting & Reporting

View Set

Ch 9: Controlling Microbial Growth in the Environment

View Set

Phlebotomy - Blood Tests: with Tube Colors

View Set

PN Pediatric Nursing Online Practice 2023 A

View Set

Facts about the Solar System Planets

View Set

Professional Communication Mid-Term

View Set

Chapter 4- Applying Contract Law

View Set