Deck 11: Personnel and Security

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is NOT a typical task performed by the security technician? 

A) Configure firewalls and IDPSs
B) Decvelop security policy 
C) Coordinate with systems and network administrators
D) Implement advanced security appliances
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Most hiring organizations are aware of the precise value of information security certifications because these programs have been in existence for a long time.
سؤال
ISACA offers the CGEIT certification that is targeted at upper-level executives such as CISOs and CIOs,directors,and consultants with knowledge and experience in IT operations..____________
سؤال
A(n)credit check can uncover past criminal behavior or other information that suggests a potential for future misconduct or a vulnerability that might render a candidate susceptible to coercion or blackmail..____________
سؤال
According to Schwartz et al.,employees who create and install security solutions fall under which classification of InfoSec positions? 

A) Definers
B) Administers 
C) Builders
D) Architects
سؤال
Integrating InfoSec into the hiring process begins with reviewing and updating job descriptions to include InfoSec responsibilities.____________
سؤال
To move the InfoSec discipline forward,organizations should take all but which of the following steps? 

A) Learn more about the requirements and qualifications for InfoSec and IT positions
B) Learn more about InfoSec budgetary and personnel needs 
C) Insist all mid-level and upper-level management take introductory InfoSec courses
D) Grant the InfoSec function an appropriate level of influence and prestige
سؤال
A conspiracy or cooperation between two or more individuals or groups to commit illegal or unethical actions is known as racketeering.____________
سؤال
The SSCP certification is more applicable to the security manager than the security technician.
سؤال
InfoSec is a profession with little personnel turnover - most InfoSec professionals stay in their positions for a very long time.
سؤال
Which of the following is typically true about the CISO position? 

A) Business managers first and technologists second
B) Accountable for the day-to-day operation of all or part of the InfoSec program 
C) Frequently reports directly to the Chief Executive Officer
D) Technically qualified individual whomay configure firewalls and IDPSs
سؤال
Maintaining a secure environment requires that the information security (InfoSec)department be carefully structured and staffed with appropriately skilled and screened personnel..____________
سؤال
A technically qualified individual who may configure firewalls and IDPSs, implement security software,diagnose and troubleshoot problems,and coordinate with systems and network administrators to ensure that security technical controls are properly implemented is known as a security architect.____________
سؤال
The most common qualification for a CISO includes the CISSP and CISM certifications.
سؤال
A requirement that all employees take time off from work,which allows the organization to audit the individual's areas of responsibility is known as a mandatory vacation policy.____________
سؤال
​Temporary workers-often called temps-may not be subject to the contractual obligations or general policies that govern other employees.
سؤال
A security manager is accountable for the day-to-day operation of all or part of the InfoSec program..____________
سؤال
Which of the following InfoSec positions is responsible for the day-to-day operation of the InfoSec program? 

A) CISO
B) Security manager 
C) Security officer
D) Security technician
سؤال
CISO's should follow six key principles to shape their careers. Which of the following is NOT among those six principles? 

A) Practice business engagement
B) Deliver services 
C) Manage relationships
D) Demonstrate technical competence
سؤال
Ideally,a candidate for the CISO position should have experience in what other InfoSec position? 

A) Security officer
B) Security consultant 
C) Security technician
D) Security manager
سؤال
Which of the following is NOT among the areas covered as part of the Certified Computer Examiner (CCE)certification process? 

A) Server hardware construction and theory 
B) General computer hardware used in data collection 
C) Ethics in practice 
D) Forensics data seizure procedures
سؤال
A security ____________________ is the typical information security entry-level position.
سؤال
Ultimately,the _______________________ is the spokesperson for the security team and is responsible for the overall InfoSec program.
سؤال
In the classification of information security positions,senior people with a lot of broad knowledge,but often not a lot of depth,fall under the category of those that ____________________.
سؤال
Before hiring security personnel,which of the following should be conducted before the organization extends an offer to any candidate,regardless of job level? 

A) New hire orientation
B) Covert surveillance 
C) Organizational tour
D) Background check
سؤال
Which of the following policies requires that every employee be able to perform the work of at least one other staff member? 

A) Collusion
B) Job rotation 
C) Two-person control
D) Separation of duties
سؤال
Which of the following policies makes it difficult for an individual to violate InfoSec and is quite useful in monitoring financial affairs? 

A) Task rotation
B) Mandatory vacations 
C) Separation of duties
D) Job rotation
سؤال
Which of the following is expected of the security technician? 

A) To be expert, certified and proficient
B) To possess technical qualifications which may vary by position 
C) To possess experience with a particular hardware and/or software package
D) All of these
سؤال
Which of the following is a responsibility of an information security department manager? 

A) Offering technical information security consulting services to network administrators 
B) Running vulnerability identification software packages 
C) Preparing postmortem analyses of information security breaches 
D) Training Access Control System administrators to set up firewalls
سؤال
Which of the following is NOT a CISSP concentration? 

A) ISSAP
B) ISSTP 
C) ISSMP
D) ISSEP
سؤال
Which of the following is a responsibility of an InfoSec technician? 

A) Developing InfoSec requirements for the organization 
B) Providing hands-on technical consulting services to teams of technical specialists 
C) Establishing procedures for the identification of information assets 
D) Managing the development of InfoSec policies
سؤال
The CompTIA ____________________ certification tests an individual's security knowledge mastery and requires two years on-the-job networking experience,with emphasis on security.
سؤال
Which of the following security certifications is considered the most prestigious for security managers and CISOs? 

A) CISSP
B) GIAC 
C) SSCP
D) SCP
سؤال
Which of the following is NOT a task that must be performed if an employee is terminated? 

A) Former employee must return all media 
B) Former employee's home computer must be audited 
C) Former employee's office computer must be secured 
D) Former employee should be escorted from the premises
سؤال
Which of the following is a domain of the CISSP examination? 

A) Cryptography
B) Risk, response, and recovery 
C) Monitoring and analysis
D) Malicious code and activity
سؤال
Which certification program has certifications that require the applicant to complete a written practical assignment that tests the applicant's ability to apply skills and knowledge.

A) GIAC
B) CGEIT 
C) CRISC
D) CISA
سؤال
Temporary hires called contract employees - or simply contractors - should not be allowed to do what? 

A) Work on the premises
B) Wander freely in and out of buildings 
C) Visit the facility without specific, prior coordination
D) Compensated by the organization based on hourly rates
سؤال
It is the responsibility of a _______________________ to develop appropriate InfoSec policies,standards,guidelines,and procedures.
سؤال
Which of the following is NOT a common type of background check that may be performed on a potential employee? 

A) Identity check
B) Political activism 
C) Motor vehicle records
D) Drug history
سؤال
Which of the following policies requires that two individuals review and approve each other's work before the task is considered complete? 

A) Task rotation
B) Two-person control 
C) Separation of duties
D) Job rotation
سؤال
a. Definers
b. Builders
c. security manager
d. security technician
e. systems programmer
f. ethics officer
g. CISSPh. SSCP
i. SANSj. CCE
provide the policies,guidelines,and standards,performing conulting and risk assessment and develop technical architectures
سؤال
Describe the certifications developed by SANS. How are they different from InfoSec certifications like CISSP and SSCP?
سؤال
a. Definers
b. Builders
c. security manager
d. security technician
e. systems programmer
f. ethics officer
g. CISSPh. SSCP
i. SANSj. CCE
a technically qualified individual who may configure firewalls and IDPSs,implement security software,diagnose and troubleshoot problems,and coordinate with systemsand network administrators to ensure that security technical controls are properly implemented
سؤال
Briefly describe at least five types of background checks.
سؤال
Describe the position of security manager.
سؤال
What is the Security+ certification and who is a typical candidate for this certification?
سؤال
Briefly describe the two outprocessing methods of handling employees who leave their positions at a company.
سؤال
a. Definers
b. Builders
c. security manager
d. security technician
e. systems programmer
f. ethics officer
g. CISSPh. SSCP
i. SANSj. CCE
computer forensics certification from ISFCE
سؤال
What are the qualifications and position requirements of a typical security technician?
سؤال
a. Definers
b. Builders
c. security manager
d. security technician
e. systems programmer
f. ethics officer
g. CISSPh. SSCP
i. SANSj. CCE
a member of the general business community having an information security related role
سؤال
Briefly describe the classifications of InfoSec positions as defined by Schwartz et al.
سؤال
a. Definers
b. Builders
c. security manager
d. security technician
e. systems programmer
f. ethics officer
g. CISSPh. SSCP
i. SANSj. CCE
accountable for the day-to-day operation of all or part of the InfoSec program and assigned objectives identified by the CISO
سؤال
a. Definers
b. Builders
c. security manager
d. security technician
e. systems programmer
f. ethics officer
g. CISSPh. SSCP
i. SANSj. CCE
an ISC2 certificate that is often considered to be the most prestigious certification for security managers
سؤال
a. Definers
b. Builders
c. security manager
d. security technician
e. systems programmer
f. ethics officer
g. CISSPh. SSCP
i. SANSj. CCE
create and install security solutions
سؤال
List the six key principles that should shape the career of a CISO.
سؤال
Describe the SSCP certification. How does it compare to the CISSP?
سؤال
What are some of the common qualifications for a CISO?
سؤال
a. Definers
b. Builders
c. security manager
d. security technician
e. systems programmer
f. ethics officer
g. CISSPh. SSCP
i. SANSj. CCE
an organization  that developed a series of technical security certifications such as the GIAC
سؤال
a. Definers
b. Builders
c. security manager
d. security technician
e. systems programmer
f. ethics officer
g. CISSPh. SSCP
i. SANSj. CCE
an ISC2 certification that focuses on practices,roles,and responsibilities as defined by experts
سؤال
a. Definers
b. Builders
c. security manager
d. security technician
e. systems programmer
f. ethics officer
g. CISSPh. SSCP
i. SANSj. CCE
a member of the IT community often responsible for complex operating system programs
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/60
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Personnel and Security
1
Which of the following is NOT a typical task performed by the security technician? 

A) Configure firewalls and IDPSs
B) Decvelop security policy 
C) Coordinate with systems and network administrators
D) Implement advanced security appliances
B
2
Most hiring organizations are aware of the precise value of information security certifications because these programs have been in existence for a long time.
 False
3
ISACA offers the CGEIT certification that is targeted at upper-level executives such as CISOs and CIOs,directors,and consultants with knowledge and experience in IT operations..____________
 False
governance
4
A(n)credit check can uncover past criminal behavior or other information that suggests a potential for future misconduct or a vulnerability that might render a candidate susceptible to coercion or blackmail..____________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
5
According to Schwartz et al.,employees who create and install security solutions fall under which classification of InfoSec positions? 

A) Definers
B) Administers 
C) Builders
D) Architects
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
6
Integrating InfoSec into the hiring process begins with reviewing and updating job descriptions to include InfoSec responsibilities.____________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
7
To move the InfoSec discipline forward,organizations should take all but which of the following steps? 

A) Learn more about the requirements and qualifications for InfoSec and IT positions
B) Learn more about InfoSec budgetary and personnel needs 
C) Insist all mid-level and upper-level management take introductory InfoSec courses
D) Grant the InfoSec function an appropriate level of influence and prestige
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
8
A conspiracy or cooperation between two or more individuals or groups to commit illegal or unethical actions is known as racketeering.____________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
9
The SSCP certification is more applicable to the security manager than the security technician.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
10
InfoSec is a profession with little personnel turnover - most InfoSec professionals stay in their positions for a very long time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is typically true about the CISO position? 

A) Business managers first and technologists second
B) Accountable for the day-to-day operation of all or part of the InfoSec program 
C) Frequently reports directly to the Chief Executive Officer
D) Technically qualified individual whomay configure firewalls and IDPSs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
12
Maintaining a secure environment requires that the information security (InfoSec)department be carefully structured and staffed with appropriately skilled and screened personnel..____________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
13
A technically qualified individual who may configure firewalls and IDPSs, implement security software,diagnose and troubleshoot problems,and coordinate with systems and network administrators to ensure that security technical controls are properly implemented is known as a security architect.____________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
14
The most common qualification for a CISO includes the CISSP and CISM certifications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
15
A requirement that all employees take time off from work,which allows the organization to audit the individual's areas of responsibility is known as a mandatory vacation policy.____________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
16
​Temporary workers-often called temps-may not be subject to the contractual obligations or general policies that govern other employees.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
17
A security manager is accountable for the day-to-day operation of all or part of the InfoSec program..____________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following InfoSec positions is responsible for the day-to-day operation of the InfoSec program? 

A) CISO
B) Security manager 
C) Security officer
D) Security technician
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
19
CISO's should follow six key principles to shape their careers. Which of the following is NOT among those six principles? 

A) Practice business engagement
B) Deliver services 
C) Manage relationships
D) Demonstrate technical competence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
20
Ideally,a candidate for the CISO position should have experience in what other InfoSec position? 

A) Security officer
B) Security consultant 
C) Security technician
D) Security manager
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following is NOT among the areas covered as part of the Certified Computer Examiner (CCE)certification process? 

A) Server hardware construction and theory 
B) General computer hardware used in data collection 
C) Ethics in practice 
D) Forensics data seizure procedures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
22
A security ____________________ is the typical information security entry-level position.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
23
Ultimately,the _______________________ is the spokesperson for the security team and is responsible for the overall InfoSec program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
24
In the classification of information security positions,senior people with a lot of broad knowledge,but often not a lot of depth,fall under the category of those that ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
25
Before hiring security personnel,which of the following should be conducted before the organization extends an offer to any candidate,regardless of job level? 

A) New hire orientation
B) Covert surveillance 
C) Organizational tour
D) Background check
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following policies requires that every employee be able to perform the work of at least one other staff member? 

A) Collusion
B) Job rotation 
C) Two-person control
D) Separation of duties
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which of the following policies makes it difficult for an individual to violate InfoSec and is quite useful in monitoring financial affairs? 

A) Task rotation
B) Mandatory vacations 
C) Separation of duties
D) Job rotation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following is expected of the security technician? 

A) To be expert, certified and proficient
B) To possess technical qualifications which may vary by position 
C) To possess experience with a particular hardware and/or software package
D) All of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which of the following is a responsibility of an information security department manager? 

A) Offering technical information security consulting services to network administrators 
B) Running vulnerability identification software packages 
C) Preparing postmortem analyses of information security breaches 
D) Training Access Control System administrators to set up firewalls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which of the following is NOT a CISSP concentration? 

A) ISSAP
B) ISSTP 
C) ISSMP
D) ISSEP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following is a responsibility of an InfoSec technician? 

A) Developing InfoSec requirements for the organization 
B) Providing hands-on technical consulting services to teams of technical specialists 
C) Establishing procedures for the identification of information assets 
D) Managing the development of InfoSec policies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
32
The CompTIA ____________________ certification tests an individual's security knowledge mastery and requires two years on-the-job networking experience,with emphasis on security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which of the following security certifications is considered the most prestigious for security managers and CISOs? 

A) CISSP
B) GIAC 
C) SSCP
D) SCP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which of the following is NOT a task that must be performed if an employee is terminated? 

A) Former employee must return all media 
B) Former employee's home computer must be audited 
C) Former employee's office computer must be secured 
D) Former employee should be escorted from the premises
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which of the following is a domain of the CISSP examination? 

A) Cryptography
B) Risk, response, and recovery 
C) Monitoring and analysis
D) Malicious code and activity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which certification program has certifications that require the applicant to complete a written practical assignment that tests the applicant's ability to apply skills and knowledge.

A) GIAC
B) CGEIT 
C) CRISC
D) CISA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
37
Temporary hires called contract employees - or simply contractors - should not be allowed to do what? 

A) Work on the premises
B) Wander freely in and out of buildings 
C) Visit the facility without specific, prior coordination
D) Compensated by the organization based on hourly rates
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
38
It is the responsibility of a _______________________ to develop appropriate InfoSec policies,standards,guidelines,and procedures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which of the following is NOT a common type of background check that may be performed on a potential employee? 

A) Identity check
B) Political activism 
C) Motor vehicle records
D) Drug history
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which of the following policies requires that two individuals review and approve each other's work before the task is considered complete? 

A) Task rotation
B) Two-person control 
C) Separation of duties
D) Job rotation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
41
a. Definers
b. Builders
c. security manager
d. security technician
e. systems programmer
f. ethics officer
g. CISSPh. SSCP
i. SANSj. CCE
provide the policies,guidelines,and standards,performing conulting and risk assessment and develop technical architectures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
42
Describe the certifications developed by SANS. How are they different from InfoSec certifications like CISSP and SSCP?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
43
a. Definers
b. Builders
c. security manager
d. security technician
e. systems programmer
f. ethics officer
g. CISSPh. SSCP
i. SANSj. CCE
a technically qualified individual who may configure firewalls and IDPSs,implement security software,diagnose and troubleshoot problems,and coordinate with systemsand network administrators to ensure that security technical controls are properly implemented
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
44
Briefly describe at least five types of background checks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
45
Describe the position of security manager.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
46
What is the Security+ certification and who is a typical candidate for this certification?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
47
Briefly describe the two outprocessing methods of handling employees who leave their positions at a company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
48
a. Definers
b. Builders
c. security manager
d. security technician
e. systems programmer
f. ethics officer
g. CISSPh. SSCP
i. SANSj. CCE
computer forensics certification from ISFCE
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
49
What are the qualifications and position requirements of a typical security technician?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
50
a. Definers
b. Builders
c. security manager
d. security technician
e. systems programmer
f. ethics officer
g. CISSPh. SSCP
i. SANSj. CCE
a member of the general business community having an information security related role
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
51
Briefly describe the classifications of InfoSec positions as defined by Schwartz et al.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
52
a. Definers
b. Builders
c. security manager
d. security technician
e. systems programmer
f. ethics officer
g. CISSPh. SSCP
i. SANSj. CCE
accountable for the day-to-day operation of all or part of the InfoSec program and assigned objectives identified by the CISO
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
53
a. Definers
b. Builders
c. security manager
d. security technician
e. systems programmer
f. ethics officer
g. CISSPh. SSCP
i. SANSj. CCE
an ISC2 certificate that is often considered to be the most prestigious certification for security managers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
54
a. Definers
b. Builders
c. security manager
d. security technician
e. systems programmer
f. ethics officer
g. CISSPh. SSCP
i. SANSj. CCE
create and install security solutions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
55
List the six key principles that should shape the career of a CISO.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
56
Describe the SSCP certification. How does it compare to the CISSP?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
57
What are some of the common qualifications for a CISO?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
58
a. Definers
b. Builders
c. security manager
d. security technician
e. systems programmer
f. ethics officer
g. CISSPh. SSCP
i. SANSj. CCE
an organization  that developed a series of technical security certifications such as the GIAC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
59
a. Definers
b. Builders
c. security manager
d. security technician
e. systems programmer
f. ethics officer
g. CISSPh. SSCP
i. SANSj. CCE
an ISC2 certification that focuses on practices,roles,and responsibilities as defined by experts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
60
a. Definers
b. Builders
c. security manager
d. security technician
e. systems programmer
f. ethics officer
g. CISSPh. SSCP
i. SANSj. CCE
a member of the IT community often responsible for complex operating system programs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 60 في هذه المجموعة.