Exam 10: Implementing Information Security
Exam 1: Introduction to Information Security78 Questions
Exam 2: The Need for Security78 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security78 Questions
Exam 4: Risk Management108 Questions
Exam 5: Planning for Security108 Questions
Exam 6: Security Technology: Firewalls and Vpns108 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools108 Questions
Exam 8: Cryptography108 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance103 Questions
Select questions type
The networks layer of the bull's-eye is the outermost ring of the bull's eye.
Free
(True/False)
4.8/5
(34)
Correct Answer:
False
Tasks or action steps that come after the task at hand are called ____________________.
Free
(Short Answer)
5.0/5
(33)
Correct Answer:
successors
A(n)____________________ is a completed document or program module that can either serve as the beginning point for a later task or become an element in the finished project.
Free
(Essay)
4.8/5
(38)
Correct Answer:
deliverable
One of the oldest models of change is the ____________________ change model.
(Short Answer)
4.7/5
(30)
The tasks or action steps that come before the specific task at hand are called successors._________________________
(True/False)
4.9/5
(29)
The security systems implementation life cycle is a process for collecting information about an organization's objectives,its technical architecture,and its information security environment._________________________
(True/False)
4.8/5
(36)
Technology ____ guides how frequently technical systems are updated,and how technical updates are approved and funded.
(Multiple Choice)
4.8/5
(41)
The goal of the ____ is to resolve any pending issues,critique the overall effort of the project,and draw conclusions about how to improve the process for the future.
(Multiple Choice)
4.8/5
(33)
The level of resistance to ____________________ impacts the ease with which an organization is able to implement the procedural and managerial changes.
(Essay)
4.8/5
(36)
Weak management support,with overly delegated responsibility and no champion,sentences the project to almost-certain failure.
(True/False)
4.9/5
(42)
Project ____________________ describes the amount of time and effort-hours needed to deliver the planned features and quality level of the project deliverables.
(Short Answer)
5.0/5
(33)
A cybernetic loop ensures that progress is measured periodically._________________________
(True/False)
4.9/5
(34)
A(n)____________________ implementation is the most common conversion strategy and involves a measured rollout of the planned system with a part of the whole being brought out and disseminated across an organization before the next piece is implemented.
(Short Answer)
4.8/5
(29)
The size of the organization and the normal conduct of business may preclude a single large training program on new security procedures or technologies.
(True/False)
4.9/5
(41)
Public organizations often have "____" to spend all their remaining funds before the end of the fiscal year.
(Multiple Choice)
4.7/5
(40)
Each organization has to determine its own project management methodology for IT and information security projects.
(True/False)
4.9/5
(32)
Management should coordinate the organization's information security vision and objectives with the communities of ____________________ involved in the execution of the plan.
(Short Answer)
4.9/5
(35)
A(n)____,typically prepared in the analysis phase of the SecSDLC,must be reviewed and verified prior to the development of the project plan.
(Multiple Choice)
4.9/5
(30)
Showing 1 - 20 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)