Home > Careers > IT Analysts Quiz: Is This The Right Career For Me
Information Security Analysts
Other names for this job might include Automatic Data Processing Systems Security Specialist (ADP Systems Security), Certified Information Systems Security Professional (CISSP), Chief Technology Officer (CTO), Computer Security Coordinator, Computer Security Information Specialist, Computer Security Specialist, Computer Specialist, Computer Systems Manager, Computer Systems Security Analyst, Computer Systems Technician
In this career quiz, there are 10 questions that will analyze if the Information Security Analysts career is right for you.
There are 3 answers to each question: Dislike, Okay and Like.
Answer “Dislike” if you tell yourself “Ugh… Sounds boring” or “I’m not sure” Answer “Okay” if you tell yourself “Umm… I think I will be okay with that” Answer “Like” if you tell yourself “Yes, I’m interested”
Ready? Let’s start
You’re interested in computers and electronics like circuit boards, processors, chips, electronic equipment, and computer hardware and software, including applications and programming.
You’re interested in telecommunications like transmission, broadcasting, switching, control, and operation of telecommunications systems.
Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
You like following set procedures and routines.
You like working with data and details more than with ideas.
You like working with ideas, and require an extensive amount of thinking.
You like searching for facts and figuring out problems mentally.
You like work that includes practical, hands-on problems and solutions.
You like dealing with plants, animals, and real-world materials like wood, tools, and machinery. You like working outside, and hate paperwork or working closely with others.
Now count how many points you have. Dislike = 0 point Okay = 1 point Like = 2 points
After you’re done counting your points. Click below to view your results.
They analyze science, engineering, business, and other data processing problems to implement and improve computer systems. Analyze user requirements, procedures, and problems to automate or improve existing systems and review computer system capabilities, workflow, and scheduling limitations. May analyze or recommend commercially available software.
They design and implement computer and information networks, such as local area networks (LAN), wide area networks (WAN), intranets, extranets, and other data communications networks. Perform network modeling, analysis, and planning. May also design network and computer security measures. May research and recommend network and data communications hardware and software.
They research, design, develop, and test operating systems-level software, compilers, and network distribution software for medical, industrial, military, communications, aerospace, business, scientific, and general computing applications. Set operational specifications and formulate and analyze software requirements. May design embedded systems software. Apply principles and techniques of computer science, engineering, and mathematical analysis.
Information Security Analysts quiz, should i become an Information Security Analyst, is IT Analysts suitable for me, do i want to be an Information Security Analyst, IT Analysts personality test
http://www.bls.gov/OOH/computer-and-information-technology/information-security-analysts.htm http://www.comptia.org/ [schema type=”review” url=”http://www.owlguru.com/” name=”OwlGuru.com” description=”OwlGuru.com is a career and college finder site. We help students to find a career and college that is right for them.” rev_name=”Information Security Analysts” rev_body=”IT Analysts plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.” author=”Stanley Tan” user_review=”4.8″ min_review=”1″ max_review=”5″ ]