12-15) (DETAILED ANSWERS) 2025 - DISTINCTION
GUARANTEED
Employers do use certifications to help assess prospects, but the best assessment is
the prospect's actual performance. - ANS-True
The ____________ concentration from (ISC)2 is the road map for incorporating security
into projects, applications, business processes, and all information systems. - ANS-
CISSP-ISSEP
(ISC)2 offers the ________________ credential, which is one of the few credentials that
address developing secure software. It evaluates professionals for the knowledge and
skills necessary to develop and deploy secure applications. - ANS-Certified Secure
Software Lifecycle Professional
The purpose of DoD Directive 8570.01 is to reduce the possibility that unqualified
personnel can gain access to secure information. - ANS-True
The ____________ concentration from (ISC)2 contains deeper managerial elements
such as project management, risk management, setting up and delivering a security
awareness program, and managing a business continuity planning program. - ANS-
CISSP-ISSMP
Which is the highest level of Check Point certification for network security? - ANS-
CCMA
The four main credentials of the ________ are Systems Security Certified Practitioner
(SSCP®), Certified Information Systems Security Professional (CISSP®), Certified
Authorization Professional (CAP®), and Certified Secure Software Lifecycle
Professional (CSSLP®). - ANS-International Information Systems Security Certification
Consortium, Inc. (ISC)2
CompTIA's Security+ certification provides ________. - ANS-entry-level information
security certification of choice for IT professionals
, Which is Cisco's highest level of certification? - ANS-Architect
The best fits for (ISC)2's_____________ are personnel responsible for developing and
implementing processes used to assess risk and for establishing security requirements.
- ANS-Certified Authorization Professional
The Infotec Security Certified Program (SCP) certification programs apply mainly to
network security topics and are most appropriate for professionals involved in securing
network components within the IT infrastructure. - ANS-True
The four main areas in NIST SP 800-50 are awareness, training, education, and
__________________. - ANS-professional development
"There are so many demands on your time, it is often difficult to justify setting aside time
to study. Also, you may find that self-study takes more time than you planned." This is a
disadvantage to choosing the self-study option that can be labeled ________. - ANS-
procrastination
Obtaining the coveted CAE/IAE or CAE/R designation means the curriculum and
research institutions meet or exceed the standards defined by the _______. - ANS-NSA
A master's degree program goes beyond the level of a bachelor's degree program and
generally consists of ___________ year(s) of study beyond a bachelor's degree. - ANS-
two
What name is given to educational institutions that meet specific federal information
assurance educational guidelines? - ANS-National Centers of Academic Excellence in
Information Assurance Education (CAE/IAE)
With university doctoral programs, completing the degree requirements takes
________. - ANS-no standard time frame
One type of degree that many institutions offer is the associate's degree. This degree is
the most accessible because it generally represents a _________ program. - ANS-two-
year
The standard bachelor's degree is a __________ program. - ANS-four-year
Which of the following is the definition of continuing professional education (CPE)? -
ANS-A standard unit of credit that equals 50 minutes of instruction.
The purpose of ________ is to provide formal training courses that lead to a certificate
or professional certification and not a degree. - ANS-continuing education