The __________ certification, considered to be one of the most prestigious certifications for security managers and CISOs, recognizes mastery of an internationally identified common body of knowledge (CBK) in InfoSec and is considered to be vendorneutral.

A. CISSP
B. GIAC Security Leadership Certification
C. Security +
D. Associate of (ISC)2


Answer: A

Computer Science & Information Technology

You might also like to view...

What will be the values of k[1] and k[3], respectively, after execution of the code segment below using the data shown?

``` int k[6] = {0, 0, 0, 0, 0, 0} Data: 2 0 1 int i, n; for (i = 3; i < 6; i++) { cin >> n; k[n] = i; } ```

Computer Science & Information Technology

The Mac OS X operating system is based on ________

A) Windows B) Linux C) UNIX D) DOS

Computer Science & Information Technology

The ____ component can display the progress of loading content, such as a photo file, into the UILoader instance.

A. LoadGraph B. ProgressGraph C. ProgressBar D. LoadBar

Computer Science & Information Technology

A field in a table with an AutoNumber data type is automatically numbered sequentially, and ________

A) those numbers change automatically when records are deleted from the database B) those numbers do not change as records are added, deleted, or modified C) those numbers do not change as records are appended, but do change when records are deleted D) those numbers change automatically when records are appended to the database

Computer Science & Information Technology