CISSP and their characteristics

CISSP and their characteristicsCertified Information Systems Security Technology Professional (CISSP) certification exam with the Consortium of International Information security systems, or (ISC) 2, a non-profit organization that supports global education and safety certification dedicated computer is given. Inspection procedures in business since 1994 and is testing six hours of using multiple choice until 2014. In 2014 testing, “Innovative advanced” question was introduced, in which more than one answer may be right. This study is six hours and 250 questions as possible 1000 points on a score of 700 or more is required to succeed.

The exams are given in a variety of Pearson VUE test centers and can be taken in Korean, Japanese, Spanish, Portuguese, French, German, Chinese and English. The examination fee is $ 599 or equivalent in 2015. This study aims to provide the knowledge of the eight domains of Common Body of Knowledge (CBK), which has been codified since 1992 to test these security software testing, security, evaluation and development of security, identity management and access, communications security, security, security of assets and risk management. This is done with questions to traditional multiple choices for 2014, but that is the current and future research as “drag and drop” in which the candidate will be asked to choose a reaction column and drag it to another column, and the problem of “hot spots”, so that when the applicant appears to be a specific place in the schedule, or in response.

CISSP and their characteristicsNew questions will cover larger surfaces can be done with a few questions to test types of tests measuring the broader IT security more traditional cognitive processes and replicate more precisely the IT security expertise in the field. (ISC) 2 provides that the candidate is suitable for network architects tests, security and against architects, security managers, IT managers and security director of systems engineering and enterprise information managers and analysts, and consultants working in the world of computer security. CBK is in a number of publications and websites and rectification CBK can be obtained from (ISC) 2, the organization also publishes the test object describes a summary of the audit and the exploitation of a formal training seminars.

Many books and websites provide useful information for the preparation of CISSP “boot camp” are checked intensively before the test is available and courses offered by educational institutions and sessions offered by IT-related security.

This entry was posted in Uncategorized. Bookmark the permalink.