Exam 10: Implementing Information Security
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
Medium- and large-sized organizations deal with the impact of technical change on the organization's operation through a(n) ____________________ control process.
Free
(Short Answer)
4.8/5
(36)
Correct Answer:
change
Performance management is the process of identifying and controlling the resources applied to a project as well as measuring progress and adjusting the process as progress is made toward the goal. _________________________
Free
(True/False)
4.9/5
(38)
Correct Answer:
False
The primary drawback to the direct changeover approach is that if the new system fails or needs modification, users may be without services while the system's bugs are worked out. _________________________
Free
(True/False)
4.9/5
(32)
Correct Answer:
True
A(n) __________ is a simple project management planning tool.
(Multiple Choice)
5.0/5
(48)
In project planning, the tasks or action steps that come before the specific task at hand are commonly referred to as prerequisites. _________________________
(True/False)
4.8/5
(33)
Technology _____________________ is a complex process that organizations use to manage the impact and costs of technology implementation, innovation, and obsolescence.
(Short Answer)
4.9/5
(36)
Planning for the implementation phase requires the creation of a detailed request for proposal, which is often assigned either to a project manager or the project champion. _________________________
(True/False)
4.9/5
(41)
The optimal time frame for training is usually one to three weeks before the new policies and technologies come online. _________________________
(True/False)
4.8/5
(30)
The date for sending the final RFP to vendors is considered a(n) __________, because it signals that all RFP preparation work is complete.
(Multiple Choice)
4.9/5
(37)
If the task is to write firewall specifications for the preparation of a(n) __________, the planner would note that the deliverable is a specification document suitable for distribution to vendors.
(Multiple Choice)
4.9/5
(40)
During the implementation phase, the organization translates its blueprint for information security into a project ____________________.
(Short Answer)
4.8/5
(34)
The bull's-eye model can be used to evaluate the sequence of steps taken to integrate parts of the information security blueprint into a project plan.
(True/False)
4.8/5
(41)
The project planner should describe the skills or personnel needed for a task, often referred to as a(n) ____________________.
(Short Answer)
5.0/5
(36)
Regardless of an organization's information security needs, the amount of effort that can be expended depends on the available funds; therefore, a ____________________ is typically prepared in the analysis phase of the SecSDLC and must be reviewed and verified prior to the development of the project plan.
(Short Answer)
4.8/5
(41)
When an estimate is flawed, as when the number of effort-hours required is underestimated, the plan should be corrected and downstream tasks updated to reflect the change.
(True/False)
4.9/5
(30)
A direct ____________________ involves stopping the old system and starting the new one without any overlap.
(Short Answer)
4.7/5
(34)
The parallel operations strategy works well when an isolated group can serve as a test area, which prevents any problems with the new system dramatically interfering with the performance of the organization as a whole. _________________________
(True/False)
4.9/5
(39)
Most information security projects require a trained project developer. _________________________
(True/False)
4.8/5
(38)
At the center of the bull's-eye model are the ____________________ used by the organization to accomplish its work.
(Short Answer)
4.7/5
(39)
Showing 1 - 20 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)