Secure Computing Chapter 14
Terms in this set (20)
The purpose of DoD Directive 8570.01 is to reduce the possibility that unqualified personnel can gain access to secure information.
The Infotec Security Certified Program (SCP) certification programs apply mainly to network security topics and are most appropriate for professionals involved in securing network components within the IT infrastructure.
Employers do use certifications to help assess prospects, but the best assessment is the prospect's actual performance.
(ISC)2 offers the ________________ credential, which is one of the few credentials that address developing secure software. It evaluates professionals for the knowledge and skills necessary to develop and deploy secure applications.
Certified Secure Software Lifecycle Professional
The ____________ concentration from (ISC)2 is the road map for incorporating security into projects, applications, business processes, and all information systems.
Which is Cisco's highest level of certification?
DoD Directive 8570.01 is a voluntary certification requirement and has increased the number of personnel who pursue certifications.
Today, one of the most common methods for identifying what skills a security professional possesses is his or her level of certification.
(ISC)2 offers the ________ credential, which is ideal for those who are working toward or already hold positions as senior network security engineers, senior security systems analysts, or senior security administrators. It covers the seven domains of best practices for information security.
Systems Security Certified Practitioner
Which is the highest level of Check Point certification for network security?
A certification is an official statement that validates a person has satisfied specific requirements.
Which (ISC)^2 certification covers seven domains of security for practitioners?
Which (ISC)^2 certification specifically addresses developing secure software?
Which certification is the highest level GIAC credential?
The _______________ Specialist, Professional, and Analyst certifications require that you hold one or more certifications from other vendors.
Which CompTIA certification targets foundational security topics?
Which ISACA certification applies to security auditors?
Which network device manufacturer offers certifications in five levels: entry, associate, professional, expert, and architect?
Which vendor offers separate certifications for its products in UNIX and Windows environments?
What is the main purpose of DoD Directive 8570.01?
It requires personnel to acquire security certifications.
YOU MIGHT ALSO LIKE...
Chapter 14: Information Security Professional Certifications
MIS 4123 Networking Exam 4
CDC 3D052, Volume 1 Unit Review
Chapter 7 - Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
OTHER SETS BY THIS CREATOR
Secure Computing Chapter 12
Secure Computing Chapter 15
Secure Computing Chapter 13