Exam 10: Implementing Information Security
Exam 1: Introduction to Information Security78 Questions
Exam 2: The Need for Security78 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security78 Questions
Exam 4: Risk Management108 Questions
Exam 5: Planning for Security108 Questions
Exam 6: Security Technology: Firewalls and Vpns108 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools108 Questions
Exam 8: Cryptography108 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance103 Questions
Select questions type
The first step in the WBS approach encompasses activities,but not deliverables.
(True/False)
4.8/5
(22)
Most information security projects require a trained project CEO._________________________
(True/False)
4.7/5
(42)
The date for sending the final RFP to vendors is considered a(n)____,because it signals that all RFP preparation work is complete.
(Multiple Choice)
4.7/5
(42)
The project planner should describe the skill set or person,often called a(n)____________________,needed to accomplish a task.
(Short Answer)
4.9/5
(34)
A(n)____________________ is a specific point in the project plan when a task that has a noticeable impact on the progress of the project plan is complete.
(Short Answer)
4.8/5
(40)
The task of creating a project plan is often assigned to either a project manager or the project leader._________________________
(True/False)
4.8/5
(32)
All organizations should designate a champion from the general management community of interest to supervise the implementation of an information security project plan.
(True/False)
4.8/5
(38)
The bull's-eye model can be used to evaluate the sequence of steps taken to integrate parts of the information security blueprint into a project plan.
(True/False)
4.9/5
(25)
A direct changeover is also known as going "fast turnkey." _________________________
(True/False)
4.9/5
(41)
Unfreezing in the Lewin change model involves thawing hard-and-fast habits and established procedures.
(True/False)
4.8/5
(29)
Medium- and large-sized organizations deal with the impact of technical change on the operation of the organization through a(n)____________________ control process.
(Essay)
4.9/5
(42)
An ideal organization fosters resilience to change._________________________
(True/False)
4.7/5
(43)
____________________ is a phenomenon in which the project manager spends more time documenting project tasks,collecting performance measurements,recording project task information,and updating project completion forecasts than in accomplishing meaningful project work.
(Short Answer)
4.9/5
(27)
Planning for the implementation phase of a security project requires the creation of a detailed project plan.
(True/False)
4.9/5
(33)
In general,the design phase is accomplished by changing the configuration and operation of the organization's information systems to make them more secure.
(True/False)
4.9/5
(35)
Showing 61 - 78 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)