Exam 10: Implementing Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In a __________ implementation, the entire security system is put in place in a single office, department, or division before expanding to the rest of the organization.

(Multiple Choice)
4.8/5
(41)

In the __________ process, measured results are compared against expected results.

(Multiple Choice)
4.9/5
(35)

The __________ methodology  has been used by many organizations and requires that issues be addressed from the general to the specific, and that the focus be on systematic solutions instead of individual problems.

(Multiple Choice)
4.8/5
(25)

By managing the __________, the organization can reduce unintended consequences by having a process to resolve the potential conflict and disruption that uncoordinated change can introduce.

(Multiple Choice)
4.9/5
(33)

Corrective action decisions are usually expressed in terms of trade-offs. _________________________

(True/False)
5.0/5
(26)

____________________ is a phenomenon in which the project manager spends more time documenting project tasks, collecting performance measurements, recording project task information, and updating project forecasts than accomplishing meaningful project work.

(Short Answer)
4.9/5
(29)

The size of the organization and the normal conduct of business may preclude a large training program on new security procedures or technologies.

(True/False)
4.9/5
(34)

The budgets of public organizations are usually the product of legislation or public meetings.

(True/False)
4.8/5
(42)

Tasks or action steps that come after the task at hand are called ____________________.

(Short Answer)
4.8/5
(32)

What can the organization do by managing the process of change

(Essay)
4.8/5
(40)

The need for qualified, trained, and available personnel constrains the project plan.

(True/False)
4.8/5
(33)

Each organization has to determine its own project management methodology for IT and information security projects.

(True/False)
4.9/5
(40)

Project ____________________ is a description of a project's features, capabilities, functions, and quality level, and is used as the basis of a project plan.

(Short Answer)
5.0/5
(38)

Tasks or action steps that come after the task at hand are called __________.

(Multiple Choice)
4.7/5
(31)

The tasks or action steps that come before the specific task at hand are called ____________________.

(Short Answer)
4.9/5
(32)

Project managers can reduce resistance to change by involving employees in the project plan. In the systems development parts of a project, this is referred to as __________.

(Multiple Choice)
4.8/5
(32)

The networks layer of the bull's eye is the outermost ring of the bull's eye.

(True/False)
4.8/5
(37)

Management should coordinate the organization's information security vision and objectives with the communities of ____________________ involved in the execution of the plan.

(Short Answer)
4.7/5
(34)

The goal of the __________ is to resolve any pending project-related issues, critique the overall effort of the project, and draw conclusions about how to improve the project management process for the future.

(Multiple Choice)
4.7/5
(36)

The __________ layer of the bull's-eye model includes computers used as servers, desktop computers, and systems used for process control and manufacturing.

(Multiple Choice)
5.0/5
(41)
Showing 21 - 40 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)