Exam 10: Implementing Information Security
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security84 Questions
Exam 4: Planning for Security110 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and Vpns117 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools121 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
In systems development, JAD (____________________ development) means getting key representatives of user groups to serve as members of the development process.
(Short Answer)
4.9/5
(41)
An ideal organization fosters resilience to change. _________________________
(True/False)
4.9/5
(35)
A(n) ____________________ implementation is the most common conversion strategy and involves a measured rollout of the planned system with a part of the system being brought out and disseminated across an organization before the next piece is implemented.
(Short Answer)
4.8/5
(35)
The ____________________ operations strategy involves running the new system concurrently with the old system.
(Short Answer)
4.8/5
(32)
The optimal time frame for training is usually one to three weeks before the new policies and technologies come online. _________________________
(True/False)
4.8/5
(45)
A __________ is usually the best approach to security project implementation.
(Multiple Choice)
4.8/5
(36)
Tasks or action steps that come after the task at hand are called ____________________.
(Short Answer)
4.9/5
(43)
When an estimate is flawed, as when the number of effort-hours required is underestimated, the plan should be corrected and downstream tasks updated to reflect the change.
(True/False)
4.8/5
(32)
During the implementation phase, the organization translates its blueprint for information security into a project ____________________.
(Short Answer)
4.7/5
(40)
The tasks or action steps that come before the specific task at hand are called ____________________.
(Short Answer)
4.8/5
(38)
Planning for the implementation phase of a security project requires the creation of a detailed project plan.
(True/False)
4.9/5
(35)
A task or subtask becomes a(n) action step when it can be completed by one individual or skill set and when it includes a single deliverable. _________________________
(True/False)
4.9/5
(31)
"Unfreezing" in the Lewin change model involves thawing hard-and-fast habits and established procedures.
(True/False)
4.9/5
(44)
A direct ____________________ involves stopping the old system and starting the new one without any overlap.
(Short Answer)
5.0/5
(45)
Technology __________ guides how frequently technical systems are updated, and how technical updates are approved and funded.
(Multiple Choice)
4.8/5
(40)
The parallel operations strategy works well when an isolated group can serve as a test area, which prevents any problems with the new system dramatically interfering with the performance of the organization as a whole. _________________________
(True/False)
4.8/5
(38)
The date for sending the final RFP to vendors is considered a(n) __________, because it signals that all RFP preparation work is complete.
(Multiple Choice)
4.7/5
(41)
The level of resistance to ____________________ impacts the ease with which an organization is able to implement procedural and managerial changes.
(Short Answer)
5.0/5
(33)
A(n) _____________________ is a completed document or program module that can either serve as the beginning point for a later task or become an element in the finished project.
(Short Answer)
4.8/5
(32)
The __________ layer of the bull's-eye model receives attention last.
(Multiple Choice)
4.8/5
(31)
Showing 21 - 40 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)