Exam 1: Introduction to the Management of Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The CNSS Security model known as the McCumber cube examines the confidentiality,integrity and ____________________ of information whether in storage,processing or transmission.

(Short Answer)
4.8/5
(38)

In the PERT technique,the difference in time between the critical path and any other path is called ____________________.

(Short Answer)
4.9/5
(40)

The process of achieving objectives using a given set of resources is called  management  \text {\underline{ management } } ._________________________

(True/False)
4.9/5
(35)

____ security addresses the ability to use the network to accomplish the organization's data communication functions.

(Multiple Choice)
4.8/5
(27)

Leadership includes supervising employee behavior,performance,attendance and attitude.

(True/False)
4.8/5
(25)

The ____________________ process provides assurance that the user has been specifically and explicitly authorized by the proper authority to access,update,or delete the contents of an information asset.

(Short Answer)
4.8/5
(23)

Changing only one of the project plan elements does not usually affect the accuracy and reliability of the estimates of the other two.

(True/False)
4.8/5
(32)

Democratic  \text {\underline{Democratic } } leaders tend to make decisions only when they are needed to avoid bringing the process to a complete halt._________________________

(True/False)
4.8/5
(37)

An information system possesses the characteristic of ____ when it is able to recognize individual users.

(Multiple Choice)
4.9/5
(29)

____________________ is the process of achieving objectives using a given set of resources.

(Short Answer)
4.8/5
(24)

Administrative closure is a process in the knowledge area of  communications \text {\underline{ communications} } ,in project management methodology._________________________

(True/False)
4.8/5
(34)

Explain the differences between a leader and a manager.

(Essay)
5.0/5
(30)

The C.I.A.triangle is an important element of the CNSS model of information security.

(True/False)
4.9/5
(42)

The protection of information and the systems and hardware that use,store,and transmit that information is known as ____.

(Multiple Choice)
4.9/5
(38)

____________________ is the protection of information and its critical elements,including the systems and hardware that use,store,and transmit that information.

(Short Answer)
4.8/5
(37)

 Network  \text {\underline{ Network } } security encompasses strategies to protect people,tangible assets,and the workplace from various threats._________________________

(True/False)
4.7/5
(37)

____ occurs when the quantity or quality of project deliverables is expanded from the original project plan

(Multiple Choice)
4.7/5
(34)

Which of the following is NOT a step in the problem-solving process?

(Multiple Choice)
4.8/5
(37)

The use of cryptographic certificates to establish Secure Sockets Layer (SSL)connections is an example of the ____ process.

(Multiple Choice)
4.8/5
(37)

Corruption of information can occur only while information is being stored.

(True/False)
4.9/5
(35)
Showing 61 - 80 of 139
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)