Exam 10: Implementing Information Security
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security84 Questions
Exam 4: Planning for Security110 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and Vpns117 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools121 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
A(n) __________ is a simple project management planning tool.
(Multiple Choice)
4.8/5
(29)
Medium- and large-sized organizations deal with the impact of technical change on the organization's operation through a(n) ____________________ control process.
(Short Answer)
4.8/5
(38)
The need for qualified, trained, and available personnel constrains the project plan.
(True/False)
4.9/5
(43)
Once a project is underway, it is managed to completion using a process known as a negative ____________________ loop.
(Short Answer)
4.8/5
(39)
Regardless of an organization's information security needs, the amount of effort that can be expended depends on the available funds; therefore, a ____________________ is typically prepared in the analysis phase of the SecSDLC and must be reviewed and verified prior to the development of the project plan.
(Essay)
4.8/5
(30)
The RFP determines the impact that a specific technology or approach can have on the organization's information assets and what it may cost. _________________________
(True/False)
4.8/5
(39)
A(n) ____________________ is a specific point in the project plan when a task that has a noticeable impact on the plan's progress is complete.
(Short Answer)
4.9/5
(40)
All organizations should designate a champion from the general management community of interest to supervise the implementation of an information security project plan.
(True/False)
4.8/5
(46)
A(n) __________ is used to justify that the project will be reviewed and verified prior to the development of the project plan.
(Multiple Choice)
4.8/5
(31)
Most information security projects require a trained project developer. _________________________
(True/False)
4.7/5
(42)
The budgets of public organizations are usually the product of legislation or public meetings.
(True/False)
4.9/5
(46)
The project planner should describe the skills or personnel needed for a task, often referred to as a(n) ____________________.
(Short Answer)
4.8/5
(31)
In a __________ implementation, the entire security system is put in place in a single office, department, or division before expanding to the rest of the organization.
(Multiple Choice)
4.7/5
(29)
By managing the __________, the organization can reduce unintended consequences by having a process to resolve the potential conflict and disruption that uncoordinated change can introduce.
(Multiple Choice)
4.8/5
(35)
Project ____________________ is a description of a project's features, capabilities, functions, and quality level, and is used as the basis of a project plan.
(Short Answer)
4.8/5
(34)
The networks layer of the bull's eye is the outermost ring of the bull's eye.
(True/False)
4.8/5
(46)
The bull's-eye model can be used to evaluate the sequence of steps taken to integrate parts of the information security blueprint into a project plan.
(True/False)
4.8/5
(46)
The primary drawback to the direct changeover approach is that if the new system fails or needs modification, users may be without services while the system's bugs are worked out. _________________________
(True/False)
4.9/5
(42)
Showing 41 - 60 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)