Exam 10: Implementing Information Security
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
Planners need to estimate the effort required to complete each task, subtask, or action step in the project plan.
(True/False)
4.9/5
(46)
In general, the design phase is accomplished by changing the configuration and operation of the organization's information systems to make them more secure.
(True/False)
4.7/5
(31)
All organizations should designate a champion from the general management community of interest to supervise the implementation of an information security project plan.
(True/False)
4.7/5
(39)
The project plan as a whole must describe how to acquire and implement the needed security controls and create a setting in which those controls achieve the desired outcomes.
(True/False)
4.8/5
(31)
Some cases of __________ are simple, such as requiring employees to begin using a new password on an announced date.
(Multiple Choice)
4.9/5
(40)
The ____________________ operations strategy involves running the new system concurrently with the old system.
(Short Answer)
4.7/5
(40)
The primary drawback to the direct changeover approach is that if the new system fails or needs modification, users may be without services while the system's bugs are worked out.
(True/False)
4.8/5
(40)
The __________ layer of the bull's-eye model receives attention last.
(Multiple Choice)
4.9/5
(40)
Weak management support, with overly delegated responsibility and no champion, sentences a project to almost-certain failure.
(True/False)
4.9/5
(45)
Each for-profit organization determines its capital budget and the rules for managing capital spending and expenses the same way.
(True/False)
4.8/5
(45)
Planning for the implementation phase of a security project requires the creation of a detailed project plan.
(True/False)
5.0/5
(39)
In the early stages of planning, the project planner should attempt to specify dates only for major employees within the project. _________________________
(True/False)
5.0/5
(30)
A(n) ____________________ implementation is the most common conversion strategy and involves a measured rollout of the planned system with a part of the system being brought out and disseminated across an organization before the next piece is implemented.
(Short Answer)
4.8/5
(35)
The work breakdown structure (WBS) can only be prepared with a complex, specialized desktop PC application.
(True/False)
4.9/5
(38)
A(n) _____________________ is a completed document or program module that can either serve as the beginning point for a later task or become an element in the finished project.
(Short Answer)
4.7/5
(32)
Showing 61 - 78 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)