Exam 10: Implementing Information Security
Exam 1: Introduction to Information Security78 Questions
Exam 2: The Need for Security78 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security78 Questions
Exam 4: Risk Management108 Questions
Exam 5: Planning for Security108 Questions
Exam 6: Security Technology: Firewalls and Vpns108 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools108 Questions
Exam 8: Cryptography108 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance103 Questions
Select questions type
Regardless of where in the budget information security items are located,monetary ____________________ determine what can (and cannot)be accomplished.
(Essay)
4.9/5
(40)
A ____ is usually the best approach to security project implementation.
(Multiple Choice)
4.8/5
(40)
A proven method for prioritizing a program of complex change is the bull's-eye method._________________________
(True/False)
4.8/5
(37)
Tasks or action steps that come after the task at hand are called ____.
(Multiple Choice)
4.7/5
(31)
The primary drawback to the direct changeover approach is that if the new system fails or needs modification,users may be without services while the system's bugs are worked out.
(True/False)
4.8/5
(43)
Technology ____________________ is a complex process that organizations use to manage the affects and costs of technology implementation,innovation,and obsolescence.
(Short Answer)
4.9/5
(31)
Project managers can reduce resistance to change by involving employees in the project plan.In systems development,this is referred to as ____.
(Multiple Choice)
4.7/5
(38)
Every organization needs to develop an information security department or program of its own.
(True/False)
4.8/5
(31)
Planners need to estimate the effort required to complete each task,subtask,or action step.
(True/False)
4.8/5
(27)
The parallel implementation works well when an isolated group can serve as the "guinea pig," which prevents any problems with the new system from dramatically interfering with the performance of the organization as a whole._________________________
(True/False)
4.9/5
(36)
The ____ involves collecting information about an organization's objectives,its technical architecture,and its information security environment.
(Multiple Choice)
4.9/5
(41)
In the ____ process,measured results are compared to expected results.
(Multiple Choice)
4.7/5
(35)
The ____ methodology has been used by many organizations,requires that issues be addressed from the general to the specific,and that the focus be on systematic solutions instead of individual problems.
(Multiple Choice)
4.9/5
(29)
The RFP determines the impact that a specific technology or approach can have on the organization's information assets and what it may cost._________________________
(True/False)
4.9/5
(38)
In the early stages of planning,the project planner should attempt to specify completion dates only for major employees within the project._________________________
(True/False)
5.0/5
(34)
The tasks or action steps that come before the specific task at hand are called ____________________.
(Short Answer)
4.8/5
(30)
Corrective action decisions are usually expressed in terms of trade-offs._________________________
(True/False)
4.9/5
(33)
Showing 21 - 40 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)