Exam 1: Introduction to the Management of Information Security
Exam 1: Introduction to the Management of Information Security139 Questions
Exam 2: Planning for Security123 Questions
Exam 3: Planning for Contingencies114 Questions
Exam 4: Information Security Policy133 Questions
Exam 5: Developing the Security Program133 Questions
Exam 6: Security Management Models120 Questions
Exam 7: Security Management Practices114 Questions
Exam 8: Risk Management: Identifying and Assessing Risk78 Questions
Exam 9: Risk Management: Controlling Risk105 Questions
Exam 10: Protection Mechanisms133 Questions
Exam 11: Personnel and Security133 Questions
Exam 12: Law and Ethics113 Questions
Select questions type
The CNSS Security model known as the McCumber cube examines the confidentiality,integrity and ____________________ of information whether in storage,processing or transmission.
(Short Answer)
4.8/5
(38)
In the PERT technique,the difference in time between the critical path and any other path is called ____________________.
(Short Answer)
4.9/5
(40)
The process of achieving objectives using a given set of resources is called
._________________________
(True/False)
4.9/5
(35)
____ security addresses the ability to use the network to accomplish the organization's data communication functions.
(Multiple Choice)
4.8/5
(27)
Leadership includes supervising employee behavior,performance,attendance and attitude.
(True/False)
4.8/5
(25)
The ____________________ process provides assurance that the user has been specifically and explicitly authorized by the proper authority to access,update,or delete the contents of an information asset.
(Short Answer)
4.8/5
(23)
Changing only one of the project plan elements does not usually affect the accuracy and reliability of the estimates of the other two.
(True/False)
4.8/5
(32)
leaders tend to make decisions only when they are needed to avoid bringing the process to a complete halt._________________________
(True/False)
4.8/5
(37)
An information system possesses the characteristic of ____ when it is able to recognize individual users.
(Multiple Choice)
4.9/5
(29)
____________________ is the process of achieving objectives using a given set of resources.
(Short Answer)
4.8/5
(24)
Administrative closure is a process in the knowledge area of
,in project management methodology._________________________
(True/False)
4.8/5
(34)
The C.I.A.triangle is an important element of the CNSS model of information security.
(True/False)
4.9/5
(42)
The protection of information and the systems and hardware that use,store,and transmit that information is known as ____.
(Multiple Choice)
4.9/5
(38)
____________________ is the protection of information and its critical elements,including the systems and hardware that use,store,and transmit that information.
(Short Answer)
4.8/5
(37)
security encompasses strategies to protect people,tangible assets,and the workplace from various threats._________________________
(True/False)
4.7/5
(37)
____ occurs when the quantity or quality of project deliverables is expanded from the original project plan
(Multiple Choice)
4.7/5
(34)
Which of the following is NOT a step in the problem-solving process?
(Multiple Choice)
4.8/5
(37)
The use of cryptographic certificates to establish Secure Sockets Layer (SSL)connections is an example of the ____ process.
(Multiple Choice)
4.8/5
(37)
Corruption of information can occur only while information is being stored.
(True/False)
4.9/5
(35)
Showing 61 - 80 of 139
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)