Exam 10: Implementing Information Security
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
Technology __________ guides how frequently technical systems are updated, and how technical updates are approved and funded.
(Multiple Choice)
4.8/5
(45)
The RFP determines the impact that a specific technology or approach can have on the organization's information assets and what it may cost. _________________________
(True/False)
4.9/5
(28)
Many public organizations must spend all budgeted funds within the fiscal year-otherwise, the subsequent year's budget is __________.
(Multiple Choice)
4.8/5
(34)
The effective use of a DMZ is one of the primary methods of securing an organization's networks.
(True/False)
4.8/5
(41)
A(n) __________ is used to justify that the project will be reviewed and verified prior to the development of the project plan.
(Multiple Choice)
4.8/5
(31)
A task or subtask becomes a(n) action step when it can be completed by one individual or skill set and when it includes a single deliverable. _________________________
(True/False)
4.9/5
(38)
A proven method for prioritizing a program of complex change is the bull's-eye method. _________________________
(True/False)
4.9/5
(29)
One of the oldest models of change is the Lewin change model, which consists of three stages: unfreezing, ____________________, and refreezing.
(Short Answer)
5.0/5
(36)
The __________ level of the bull's-eye model establishes the ground rules for the use of all systems and describes what is appropriate and what is inappropriate; it enables all other information security components to function correctly.
(Multiple Choice)
4.8/5
(36)
A direct changeover is also known as going "fast turnkey." _________________________
(True/False)
4.7/5
(43)
"Unfreezing" in the Lewin change model involves thawing hard-and-fast habits and established procedures.
(True/False)
5.0/5
(34)
The level of resistance to ____________________ impacts the ease with which an organization is able to implement procedural and managerial changes.
(Short Answer)
4.9/5
(36)
The first step in the work breakdown structure (WBS) approach encompasses activities, but not deliverables.
(True/False)
4.9/5
(31)
Once a project is underway, it is managed to using a process known as a negative ____________________ loop.
(Short Answer)
4.8/5
(38)
In systems development, JAD (____________________ development) means getting key representatives of user groups to serve as members of the development process.
(Short Answer)
4.9/5
(33)
A __________ is usually the best approach to security project implementation.
(Multiple Choice)
4.9/5
(32)
A(n) ____________________ is a specific point in the project plan when a task that has a noticeable impact on the plan's progress is complete.
(Short Answer)
4.8/5
(36)
An ideal organization fosters resilience to change. _________________________
(True/False)
4.9/5
(37)
Every organization needs to develop an information security department or program of its own.
(True/False)
4.8/5
(38)
Once a project is underway, it is managed using a process known as gap analysis, which ensures that progress is measured periodically. _________________________
(True/False)
4.8/5
(37)
Showing 41 - 60 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)