What organization designates a person as a CISSP?

a. International Information Systems Security Certification Consortium (ISC2)
b. EC-Council
c. SANS Institute
d. GIAC

Answer: a. International Information Systems Security Certification Consortium (ISC2)

Computer Science & Information Technology

You might also like to view...

Insufficient lighting can produce ________ on a monitor's screen

Fill in the blank(s) with correct word

Computer Science & Information Technology

Match each item with a statement below.

A. Used to determine the MAC address associated with an IP address within the sender's network. B. A method of gaining access to the underlying host through flaws in the hypervisor. C. A virtual switch that can be accessed from VMs running on any host managed by vCenter Server. D. A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC. E. A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors. F. A common open source protocol used to communicate between switches and a management server. G. Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages. H. Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications. I. A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches. J. A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.

Computer Science & Information Technology