Professional Certification Posts

Uncrackable Passwords, Port Ranges, and OOP: Practice Questions of the Day!

Every day in this space, we post a question of the day for each of the certifications we offer on Skillset.com: PMP, CISSP, CEH, CHFI, Network+ and Security+.

We will link to the live question page, where you can test yourself (for free!) and find the answer to these sample questions and more. We will also crosspost these daily questions in their respective Facebook groups, which are linked in context below, so you can discuss them with fellow test-takers there:

 

CISSP Question of the Day

In Object-Oriented Programming, encapsulation is also referred to as… ?

A. Encryption
B. Data hiding
C. Fuzzing
D. Data transfer

View this CISSP practice question on Skillset to test your knowledge and see the answer.
Discuss this question in our CISSP Facebook group.

 

PMP Question of the Day

When project team members are selected in advance, they are considered what?

A. Subcontracting
B. Pre-assigned
C. Activity cost estimates
D. Acquisition

View this PMP practice question on Skillset to test your knowledge and see the answer.
Discuss this question in our PMP Facebook group.

Unreachable Websites, Closing Projects, and Expert Witnesses: Skillset’s Questions of the Day!

Every day in this space, we post a question of the day for each of the certifications we offer on Skillset.com: PMP, CISSP, CEH, CHFI, Network+ and Security+.

We will link to the live question page, where you can test yourself (for free!) and find the answer to these sample questions and more. We will also crosspost these daily questions in their respective Facebook groups, which are linked in context below, so you can discuss them with fellow test-takers there:

 

CISSP Question of the Day

As the network administrator of your organization, customers report that your website is unreachable. What part of security has been compromised?:

A. Authentication
B. Integrity
C. Availability
D. Confidentiality

View this CISSP practice question on Skillset to test your knowledge and see the answer.
Discuss this question in our CISSP Facebook group.

 

PMP Question of the Day

All of the following are inputs into the Close Project or Phase, except what?

A. Accepted deliverables
B. Organizational process assets
C. Expert judgement
D. Project management plan

View this PMP practice question on Skillset to test your knowledge and see the answer.
Discuss this question in our PMP Facebook group.

 

CEH Question of the Day

Which of the following activities are considered to be anti-forensics?

A. Trail obfuscation
B. Artifact wiping
C. Data hiding
D. All of these

View this CEH practice question on Skillset to test your knowledge and see the answer.
Discuss this question in our CEH Facebook group.

 

CHFI Question of the Day

The role of an expert witness is to…?

A. Evaluate
B. Testify
C. Educate
D. Any of these

View this CHFI practice question on Skillset to test your knowledge and see the answer.
Discuss this question in our CHFI Facebook group.

 

Network+ Question of the Day

Which of the following can be used to secure a VPN connection with encryption? Choose all that apply:

A. PPP
B. L2TP
C. IPSEC
D. HDLC

View this Network+ practice question on Skillset to test your knowledge see the answer.
Discuss this question in our Network+ Facebook group.

 

Security+ Question of the Day

True or False: BitLocker cannot provide encryption on computers not equipped with TPM (Trusted Platform Module) in Windows?

A. True
B. False

View this Security+ practice question on Skillset to test your knowledge and see the answer.
Discuss the question in our Security+ Facebook group.

Announcing a New Certification Resource: Skillset Facebook Groups!

We’re big on practice questions at Skillset. That’s why each of our certification practice tests has several thousand questions within it: Because practice, you may have heard, makes perfect.

But if there’s one thing we’re as enthusiastic about as practice questions, it’s discussion, feedback, and back-and-forth learning. The topic we spend the most time on, beyond writing more questions, is how to give our users more options to connect with one another, provide insights and feedback, and learn from one another.

That’s exactly why we’ve created a series of Facebook Groups specifically designed to provide motivation and discussion around certification.

For every certification practice test we provide on Skillset, we’ve created a group (and we’ll keep adding them as we add certification tests). And in each group, we’ll post one question every day. The objective being: Find your daily motivation, learn something new, and find a resource and a community to rally around as you prepare for your own big test (or as you simply stay fresh and knowledgable).

Check out (and join!) each of our groups as they relate to specific tests:

Let us know what you think, and keep an eye out for our first questions, coming up today — and every day — for you to pick over and discuss.

Happy testing!

 

Why IT Pros Lie: A Certification Doesn’t Always Make You Qualified for a Job (And That’s Okay!)

It’s the most open dirty little secret in Information Technology hiring today: the lies we tell to get our foot in the door.

To be sure, they are white lies, subtly bolstering our appeal to hiring managers by insinuating greater experience or a more narrow focus than we might actually have had with a specific project or technology. A couple weeks watching SQL logs while the DBA was on vacation might turn you into a database administrator; fiddling with widget on the company home page means you have experience with JavaScript.

Have you every started an IT job where you knew everything you needed to know the minute you walked in the door? Few people have. Information Technology is a vast and ever-changing field, with many silos of knowledge and few systems which can be relied upon to operate identically from organization to organization. Learning the quirks and foibles of a particular combination of software versions and hardware systems is a skill in and of itself. It is not one that can be easily tested in a lab environment.

Of course, these lies are provoked in some sense by the lies we’re told in the job postings themselves: requests for expertise in wildly disparate technologies which no sane person could specialize in simultaneously, or demands for years of experience with technologies which have only emerged months earlier. The bill of goods that job candidates are selling is matched, in some sense, by the goods that employers claim they are looking for.

Why You Need a Security+ Certification in 2015

In the Information Technology (IT) industry, acquiring certifications in certain disciplines is just as essential as acquiring a traditional degree.

There are numerous benefits that come from acquiring an IT certification, so whether you are an active or aspiring IT professional, it would behoove you to consider what IT certifications are available and what they can do for you. There are many different types of certifications depending on what type of IT professional you aspire to be. Choosing the right certifications is essential to furthering your career as a professional. One example of an IT certification that can allow you to further your career immediately is the Security+ certification.

Security+ (pronounced “Security-Plus”) is a certification provided by CompTIA which designates that a professional is knowledgeable in the field of security, which is becoming one of the fastest growing fields in the IT sector. This is a certification that you should update every three years through CompTIA in order to make sure that you are on the cutting edge of security technology.

Some of the most relevant job titles for this certification include IA Technician, IA Manager, Network Administrator, Security Consultant and Security Engineer. The CompTIA Security+ certification has been chosen by the U.S. Department of Defense, Hitachi Information Systems, CSC, General Dynamics and Northrop Grumman as the ideal way to indicate that a professional is apt in the right areas of security IT.