Exam 10: Implementing Information Security
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
In a __________ implementation, the entire security system is put in place in a single office, department, or division before expanding to the rest of the organization.
(Multiple Choice)
4.8/5
(41)
In the __________ process, measured results are compared against expected results.
(Multiple Choice)
4.9/5
(35)
The __________ methodology has been used by many organizations and requires that issues be addressed from the general to the specific, and that the focus be on systematic solutions instead of individual problems.
(Multiple Choice)
4.8/5
(25)
By managing the __________, the organization can reduce unintended consequences by having a process to resolve the potential conflict and disruption that uncoordinated change can introduce.
(Multiple Choice)
4.9/5
(33)
Corrective action decisions are usually expressed in terms of trade-offs. _________________________
(True/False)
5.0/5
(26)
____________________ is a phenomenon in which the project manager spends more time documenting project tasks, collecting performance measurements, recording project task information, and updating project forecasts than accomplishing meaningful project work.
(Short Answer)
4.9/5
(29)
The size of the organization and the normal conduct of business may preclude a large training program on new security procedures or technologies.
(True/False)
4.9/5
(34)
The budgets of public organizations are usually the product of legislation or public meetings.
(True/False)
4.8/5
(42)
Tasks or action steps that come after the task at hand are called ____________________.
(Short Answer)
4.8/5
(32)
The need for qualified, trained, and available personnel constrains the project plan.
(True/False)
4.8/5
(33)
Each organization has to determine its own project management methodology for IT and information security projects.
(True/False)
4.9/5
(40)
Project ____________________ is a description of a project's features, capabilities, functions, and quality level, and is used as the basis of a project plan.
(Short Answer)
5.0/5
(38)
Tasks or action steps that come after the task at hand are called __________.
(Multiple Choice)
4.7/5
(31)
The tasks or action steps that come before the specific task at hand are called ____________________.
(Short Answer)
4.9/5
(32)
Project managers can reduce resistance to change by involving employees in the project plan. In the systems development parts of a project, this is referred to as __________.
(Multiple Choice)
4.8/5
(32)
The networks layer of the bull's eye is the outermost ring of the bull's eye.
(True/False)
4.8/5
(37)
Management should coordinate the organization's information security vision and objectives with the communities of ____________________ involved in the execution of the plan.
(Short Answer)
4.7/5
(34)
The goal of the __________ is to resolve any pending project-related issues, critique the overall effort of the project, and draw conclusions about how to improve the project management process for the future.
(Multiple Choice)
4.7/5
(36)
The __________ layer of the bull's-eye model includes computers used as servers, desktop computers, and systems used for process control and manufacturing.
(Multiple Choice)
5.0/5
(41)
Showing 21 - 40 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)