Exam 1: Introduction to the Management of Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is the first step in the problem-solving process?

(Multiple Choice)
4.8/5
(29)

The authorization process takes place before the authentication process.

(True/False)
4.9/5
(32)

List and explain the four principles of management under the contemporary or popular management theory.Briefly define each.

(Essay)
4.7/5
(37)

The first step in solving problems is to recognize and  gather facts about \text {\underline{ gather facts about} } the problem._________________________

(True/False)
4.8/5
(37)

When you review technological feasibility,you address the organization's financial ability to purchase the technology needed to implement a candidate solution

(True/False)
5.0/5
(40)

Which of the following is NOT a Principle of Information Security Management?

(Multiple Choice)
4.8/5
(36)

The ____ diagramming technique uses simple bar charts that are simple to read and thus easy to present to management.

(Multiple Choice)
4.9/5
(38)

Autocratic  \text {\underline{Autocratic } } leaders typically seek input from all interested parties,and then formulate a position that can be supported by the majority._________________________

(True/False)
4.9/5
(35)

____ was originally developed in the late 1950s to meet the need of the rapidly expanding engineering projects associated with government acquisitions such as weapons systems.

(Multiple Choice)
4.9/5
(32)

A good plan defines project deliverables in ____ against which actual results are easily compared.

(Multiple Choice)
4.9/5
(37)

Identification is typically performed by means of a(n)____.

(Multiple Choice)
4.8/5
(26)

If the project deliverables meets the requirements specified in the project plan,the project has met its ____ objective,otherwise it has not.

(Multiple Choice)
4.9/5
(26)

List the advantages and disadvantages of using the Program Evaluation and Review Technique method?

(Essay)
4.8/5
(38)

Which of the following is NOT a benefit that organizations that make project management a priority accrue?

(Multiple Choice)
4.8/5
(28)

The ____ of information refers to the ability to access information without interference or obstruction and in a useable format.

(Multiple Choice)
4.9/5
(32)

 Operations \underline { \text { Operations } } security focuses on securing the organization's ability to carry out its operational activities without interruption or compromise._________________________

(True/False)
4.9/5
(35)

Communications  \text {\underline{Communications } } security addresses the protection of an organization's data networking devices,connections,and contents._________________________

(True/False)
4.8/5
(33)

Policies  \text {\underline{Policies } } are InfoSec operations that are specifically managed as separate entities._________________________

(True/False)
4.9/5
(36)

The ____ community supplies and supports information technology appropriate to a business needs.

(Multiple Choice)
4.9/5
(39)

____________________ occurs when the quantity or quality of project deliverables is expanded from the original project plan.

(Short Answer)
4.9/5
(30)
Showing 41 - 60 of 139
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)