Part 5 Flashcards

0
Q

Just as implementing a robust, secure environment is a dynamic process, creating a ____of security professionals is also a dynamic process.

A

highly skilled staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Provide _____ for IT Staff—Now and Forever

A

Security Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

New ____ are being discovered and new attacks are being launched on a regular basis.

A

vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is important for the IT staff to be prepared to _____and_____to new threats and vulnerabilities.

A

identify and respond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It is recommended that those interested in gaining a deep security understanding start with a _____ program. A _______ program is one that focuses on concepts rather than specific products.

A

vendor-neutral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SANS

A

SysAdmin, Audit, Network, Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The ____offers two introductory programs: Intro to Information Security (Security 301),22 a five-day class designed for peo- ple just starting out in the security field, and the SANS Security Essentials Bootcamp (Security 401),23 a six-day class designed for people with some security experience.

A

SANS (SysAdmin, Audit, Network, Security) Institute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Another option is start with a program that follows the ____ certification requirements, such as the Global Knowledge Essentials of Information Security.24 Some colleges offer similar programs.

A

CompTia Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Arguably one of the best ways to determine whether an employee has a strong grasp of information security concepts is if she can achieve the CISSP certification.

A

Certified Information Systems Security Professional

Candidates for this certification are tested on their under- standing of the following 10 knowledge domains:

● Access control
● Application security
● Business continuity and disaster recovery planning
● Cryptography
● Information security and risk management
● Legal, regulations, compliance, and investigations
● Operations security
● Physical (environmental) security
● Security architecture and design
● Telecommunications and network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly