Exam 10: Implementing Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The first step in the WBS approach encompasses activities,but not deliverables.

(True/False)
4.8/5
(22)

What major project tasks does the WBS document?

(Essay)
4.9/5
(35)

Most information security projects require a trained project CEO._________________________

(True/False)
4.7/5
(42)

The date for sending the final RFP to vendors is considered a(n)____,because it signals that all RFP preparation work is complete.

(Multiple Choice)
4.7/5
(42)

The project planner should describe the skill set or person,often called a(n)____________________,needed to accomplish a task.

(Short Answer)
4.9/5
(34)

A(n)____________________ is a specific point in the project plan when a task that has a noticeable impact on the progress of the project plan is complete.

(Short Answer)
4.8/5
(40)

The Lewin change model consists of ____.

(Multiple Choice)
4.8/5
(48)

The task of creating a project plan is often assigned to either a project manager or the project leader._________________________

(True/False)
4.8/5
(32)

All organizations should designate a champion from the general management community of interest to supervise the implementation of an information security project plan.

(True/False)
4.8/5
(38)

The bull's-eye model can be used to evaluate the sequence of steps taken to integrate parts of the information security blueprint into a project plan.

(True/False)
4.9/5
(25)

A direct changeover is also known as going "fast turnkey." _________________________

(True/False)
4.9/5
(41)

Unfreezing in the Lewin change model involves thawing hard-and-fast habits and established procedures.

(True/False)
4.8/5
(29)

Medium- and large-sized organizations deal with the impact of technical change on the operation of the organization through a(n)____________________ control process.

(Essay)
4.9/5
(42)

An ideal organization fosters resilience to change._________________________

(True/False)
4.7/5
(43)

JAD stands for ____________________ application development.

(Short Answer)
4.8/5
(37)

____________________ is a phenomenon in which the project manager spends more time documenting project tasks,collecting performance measurements,recording project task information,and updating project completion forecasts than in accomplishing meaningful project work.

(Short Answer)
4.9/5
(27)

Planning for the implementation phase of a security project requires the creation of a detailed project plan.

(True/False)
4.9/5
(33)

In general,the design phase is accomplished by changing the configuration and operation of the organization's information systems to make them more secure.

(True/False)
4.9/5
(35)
Showing 61 - 78 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)