Exam 10: Implementing Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The networks layer of the bull's-eye is the outermost ring of the bull's eye.

Free
(True/False)
4.8/5
(34)
Correct Answer:
Verified

False

Tasks or action steps that come after the task at hand are called ____________________.

Free
(Short Answer)
5.0/5
(33)
Correct Answer:
Verified

successors

A(n)____________________ is a completed document or program module that can either serve as the beginning point for a later task or become an element in the finished project.

Free
(Essay)
4.8/5
(38)
Correct Answer:
Verified

deliverable

One of the oldest models of change is the ____________________ change model.

(Short Answer)
4.7/5
(30)

____ is a simple planning tool.

(Multiple Choice)
4.9/5
(38)

The tasks or action steps that come before the specific task at hand are called successors._________________________

(True/False)
4.9/5
(29)

What can the organization do by managing the process of change?

(Essay)
4.9/5
(41)

The security systems implementation life cycle is a process for collecting information about an organization's objectives,its technical architecture,and its information security environment._________________________

(True/False)
4.8/5
(36)

Technology ____ guides how frequently technical systems are updated,and how technical updates are approved and funded.

(Multiple Choice)
4.8/5
(41)

The goal of the ____ is to resolve any pending issues,critique the overall effort of the project,and draw conclusions about how to improve the process for the future.

(Multiple Choice)
4.8/5
(33)

The level of resistance to ____________________ impacts the ease with which an organization is able to implement the procedural and managerial changes.

(Essay)
4.8/5
(36)

Weak management support,with overly delegated responsibility and no champion,sentences the project to almost-certain failure.

(True/False)
4.9/5
(42)

Project ____________________ describes the amount of time and effort-hours needed to deliver the planned features and quality level of the project deliverables.

(Short Answer)
5.0/5
(33)

A cybernetic loop ensures that progress is measured periodically._________________________

(True/False)
4.9/5
(34)

A(n)____________________ implementation is the most common conversion strategy and involves a measured rollout of the planned system with a part of the whole being brought out and disseminated across an organization before the next piece is implemented.

(Short Answer)
4.8/5
(29)

The size of the organization and the normal conduct of business may preclude a single large training program on new security procedures or technologies.

(True/False)
4.9/5
(41)

Public organizations often have "____" to spend all their remaining funds before the end of the fiscal year.

(Multiple Choice)
4.7/5
(40)

Each organization has to determine its own project management methodology for IT and information security projects.

(True/False)
4.9/5
(32)

Management should coordinate the organization's information security vision and objectives with the communities of ____________________ involved in the execution of the plan.

(Short Answer)
4.9/5
(35)

A(n)____,typically prepared in the analysis phase of the SecSDLC,must be reviewed and verified prior to the development of the project plan.

(Multiple Choice)
4.9/5
(30)
Showing 1 - 20 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)