Exam 10: Implementing Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Technology __________ guides how frequently technical systems are updated, and how technical updates are approved and funded.

(Multiple Choice)
4.8/5
(45)

The RFP determines the impact that a specific technology or approach can have on the organization's information assets and what it may cost. _________________________

(True/False)
4.9/5
(28)

Many public organizations must spend all budgeted funds within the fiscal year-otherwise, the subsequent year's budget is __________.

(Multiple Choice)
4.8/5
(34)

The effective use of a DMZ is one of the primary methods of securing an organization's networks.

(True/False)
4.8/5
(41)

A(n) __________ is used to justify that the project will be reviewed and verified prior to the development of the project plan.

(Multiple Choice)
4.8/5
(31)

A task or subtask becomes a(n) action step when it can be completed by one individual or skill set and when it includes a single deliverable. _________________________

(True/False)
4.9/5
(38)

A proven method for prioritizing a program of complex change is the bull's-eye method. _________________________

(True/False)
4.9/5
(29)

One of the oldest models of change is the Lewin change model, which consists of three stages: unfreezing, ____________________, and refreezing.

(Short Answer)
5.0/5
(36)

The __________ level of the bull's-eye model establishes the ground rules for the use of all systems and describes what is appropriate and what is inappropriate; it enables all other information security components to function correctly.

(Multiple Choice)
4.8/5
(36)

A direct changeover is also known as going "fast turnkey." _________________________

(True/False)
4.7/5
(43)

"Unfreezing" in the Lewin change model involves thawing hard-and-fast habits and established procedures.

(True/False)
5.0/5
(34)

The level of resistance to ____________________ impacts the ease with which an organization is able to implement procedural and managerial changes.

(Short Answer)
4.9/5
(36)

The first step in the work breakdown structure (WBS) approach encompasses activities, but not deliverables.

(True/False)
4.9/5
(31)

Once a project is underway, it is managed to using a process known as a negative ____________________ loop.

(Short Answer)
4.8/5
(38)

In systems development, JAD (____________________ development) means getting key representatives of user groups to serve as members of the development process.

(Short Answer)
4.9/5
(33)

A __________ is usually the best approach to security project implementation.

(Multiple Choice)
4.9/5
(32)

A(n) ____________________ is a specific point in the project plan when a task that has a noticeable impact on the plan's progress is complete.

(Short Answer)
4.8/5
(36)

An ideal organization fosters resilience to change. _________________________

(True/False)
4.9/5
(37)

Every organization needs to develop an information security department or program of its own.

(True/False)
4.8/5
(38)

Once a project is underway, it is managed using a process known as gap analysis, which ensures that progress is measured periodically. _________________________

(True/False)
4.8/5
(37)
Showing 41 - 60 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)