Exam 10: Implementing Information Security

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

A(n) __________ is a simple project management planning tool.

(Multiple Choice)
4.8/5
(29)

Medium- and large-sized organizations deal with the impact of technical change on the organization's operation through a(n) ____________________ control process.

(Short Answer)
4.8/5
(38)

The need for qualified, trained, and available personnel constrains the project plan.

(True/False)
4.9/5
(43)

Once a project is underway, it is managed to completion using a process known as a negative ____________________ loop.

(Short Answer)
4.8/5
(39)

Regardless of an organization's information security needs, the amount of effort that can be expended depends on the available funds; therefore, a ____________________ is typically prepared in the analysis phase of the SecSDLC and must be reviewed and verified prior to the development of the project plan.

(Essay)
4.8/5
(30)

The RFP determines the impact that a specific technology or approach can have on the organization's information assets and what it may cost. _________________________

(True/False)
4.8/5
(39)

A(n) ____________________ is a specific point in the project plan when a task that has a noticeable impact on the plan's progress is complete.

(Short Answer)
4.9/5
(40)

What minimum attributes for project tasks does the WBS document?

(Essay)
4.8/5
(33)

All organizations should designate a champion from the general management community of interest to supervise the implementation of an information security project plan.

(True/False)
4.8/5
(46)

A(n) __________ is used to justify that the project will be reviewed and verified prior to the development of the project plan.

(Multiple Choice)
4.8/5
(31)

Most information security projects require a trained project developer. _________________________

(True/False)
4.7/5
(42)

The budgets of public organizations are usually the product of legislation or public meetings.

(True/False)
4.9/5
(46)

The project planner should describe the skills or personnel needed for a task, often referred to as a(n) ____________________.

(Short Answer)
4.8/5
(31)

In a __________ implementation, the entire security system is put in place in a single office, department, or division before expanding to the rest of the organization.

(Multiple Choice)
4.7/5
(29)

By managing the __________, the organization can reduce unintended consequences by having a process to resolve the potential conflict and disruption that uncoordinated change can introduce.

(Multiple Choice)
4.8/5
(35)

Project ____________________ is a description of a project's features, capabilities, functions, and quality level, and is used as the basis of a project plan.

(Short Answer)
4.8/5
(34)

The networks layer of the bull's eye is the outermost ring of the bull's eye.

(True/False)
4.8/5
(46)

What are the major steps in executing the project plan?

(Essay)
4.8/5
(28)

The bull's-eye model can be used to evaluate the sequence of steps taken to integrate parts of the information security blueprint into a project plan.

(True/False)
4.8/5
(46)

The primary drawback to the direct changeover approach is that if the new system fails or needs modification, users may be without services while the system's bugs are worked out. _________________________

(True/False)
4.9/5
(42)
Showing 41 - 60 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)