Exam 10: Implementing Information Security
Exam 1: Introduction to Information Security78 Questions
Exam 2: The Need for Security78 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security78 Questions
Exam 4: Risk Management108 Questions
Exam 5: Planning for Security108 Questions
Exam 6: Security Technology: Firewalls and Vpns108 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools108 Questions
Exam 8: Cryptography108 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance103 Questions
Select questions type
During the implementation phase,the organization translates its blueprint for information security into a concrete project ____________________.
(Short Answer)
5.0/5
(33)
The ____ layer of the bull's-eye model includes computers used as servers,desktop computers,and systems used for process control and manufacturing systems.
(Multiple Choice)
4.9/5
(45)
The project plan as a whole must describe how to acquire and implement the needed security controls and create a setting in which those controls achieve the desired outcomes.
(True/False)
4.7/5
(33)
A direct ____________________ involves stopping the old method and beginning the new.
(Essay)
4.8/5
(42)
Once a project is underway,it is managed to completion using a process known as a negative ____________________ loop.
(Short Answer)
4.9/5
(34)
The WBS can be prepared with a simple desktop PC word processing program.
(True/False)
4.9/5
(40)
The primary drawback to the direct changeover approach is that if the new system fails or needs modification,users may be without services while the system's bugs are worked out._________________________
(True/False)
4.8/5
(40)
In a ____ implementation,the entire security system is put in place in a single office,department,or division,and issues that arise are dealt with before expanding to the rest of the organization.
(Multiple Choice)
4.8/5
(32)
When an estimate is flawed,as when the number of effort-hours required is underestimated,the plan should be corrected and downstream tasks updated to reflect the change.
(True/False)
4.9/5
(34)
If the task is to write firewall specifications for the preparation of a(n)____,the planner would note that the deliverable is a specification document suitable for distribution to vendors.
(Multiple Choice)
4.8/5
(34)
The budgets of public organizations are usually the product of legislation or public meetings.
(True/False)
4.8/5
(46)
Some cases of ____ are simple,such as requiring employees to use a new password beginning on an announced date.
(Multiple Choice)
4.8/5
(38)
The ____________________ operations strategy involves running the new methods alongside the old methods.
(Short Answer)
4.9/5
(30)
By managing the ____,the organization can reduce unintended consequences by having a process to resolve potential conflict and disruption that uncoordinated change can introduce.
(Multiple Choice)
4.7/5
(34)
The optimal time frame for training is usually one to three weeks before the new policies and technologies come online._________________________
(True/False)
4.7/5
(45)
A task or subtask becomes an action step when it can be completed by one individual or skill set and when it includes a single deliverable._________________________
(True/False)
4.9/5
(33)
The ____ level of the bull's-eye model establishes the ground rules for the use of all systems and describes what is appropriate and what is inappropriate,it enables all other information security components to function correctly.
(Multiple Choice)
4.9/5
(45)
The ____ layer of the bull's-eye model receives attention last.
(Multiple Choice)
4.8/5
(36)
The need for qualified,trained,and available personnel constrains the project plan.
(True/False)
4.7/5
(39)
Each for-profit organization determines its capital budget and the rules for managing capital spending and expenses the same way.
(True/False)
4.9/5
(43)
Showing 41 - 60 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)