Exam 1: Introduction to the Management of Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The Project Management Institute (PMI)sponsors two project management certificate programs: the Project Management Professional (PMP)and the ____.

Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
Verified

A

While other project management approaches exist,the ____________________,from the Project Management Institute is considered the industry best practice.

Free
(Short Answer)
4.9/5
(33)
Correct Answer:
Verified

PMBoK
Project Management Body of Knowledge

While the PERT technique was being developed to support government acquisitions,the ____________________ technique,similar in structure,was being developed in industry.

Free
(Short Answer)
4.8/5
(29)
Correct Answer:
Verified

CPM
Critical Path Method

Physical security is concerned with the protection of the ____.

(Multiple Choice)
4.7/5
(30)

During the project execution phase,the positive  \text {\underline{positive } } feedback loop or cybernetic loop ensures that progress is measured periodically._________________________

(True/False)
4.9/5
(36)

The first step in the WBS is to identify the work to be accomplished in the task or task area; that is,the activities and constraints.  \text {\underline{constraints. } } ._________________________

(True/False)
4.8/5
(34)

____________________ occurs when the project manager spends more time documenting project tasks,collecting performance measurements,recording project task information,and updating project completion forecasts than accomplishing meaningful project work.

(Short Answer)
4.8/5
(31)

Tactical planning focuses on the day-to-day operation of local resources.

(True/False)
4.9/5
(39)

In the WBS approach,the project plan is first broken down into tasks placed on the WBS task list.The minimum attributes that should be identified for each task include all but which of the following?

(Multiple Choice)
4.9/5
(35)

Project team members may require special training on newly introduced technologies,and this may increase the risk of human resource turnover because personnel trained in a new,high-demand skill are more likely to leave the organization in search of better opportunities elsewhere.

(True/False)
4.9/5
(42)

____ leaders reserve all decision-making responsibilities for themselves.

(Multiple Choice)
4.9/5
(25)

The CNSS security model includes detailed guidelines and policies that direct the implementation of controls.

(True/False)
4.9/5
(42)

All managers are expected to play a leadership role.

(True/False)
4.8/5
(33)

The principle of management dedicated to the structuring of resources to support the accomplishment of objectives is called ____.

(Multiple Choice)
4.9/5
(32)

____ of information ensures that only those with sufficient privileges and a demonstrated need may access certain information.

(Multiple Choice)
4.8/5
(37)

The characteristic of ____ exists when a control provides assurance that every activity undertaken can be attributed to a named person or automated process.

(Multiple Choice)
4.8/5
(34)

Training project team members on how to use new technologies when they are introduced  decreases  \text {\underline{ decreases } } the risk of human resource turnover._________________________

(True/False)
4.9/5
(33)

A manager has informational,interpersonal,and ____ roles within the organization.

(Multiple Choice)
4.9/5
(30)

The first step in solving problems is to gather facts and make assumptions.

(True/False)
4.9/5
(38)

 Operations  \text {\underline{ Operations } } are discrete sequences of activities with starting points and defined completion points._________________________

(True/False)
4.8/5
(37)
Showing 1 - 20 of 139
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)