Exam 1: Introduction to the Management of Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

List the steps that can be used as a basic blueprint for solving organizational problems.

(Essay)
4.7/5
(30)

If the project deliverables meet the requirements specified in the project plan,the project has met its ____________________ objective.

(Short Answer)
4.8/5
(38)

During the  identification \text {\underline{ identification} } process,a control provides proof that a user possesses the identity that he or she claims._________________________

(True/False)
4.8/5
(35)

The  integrity  \text {\underline{ integrity } } of information is threatened when it is exposed to corruption,damage,or destruction._________________________

(True/False)
4.8/5
(32)

The management of human resources must address many complicating factors; which of the following is NOT among them?

(Multiple Choice)
4.8/5
(41)

The most popular of networking dependency diagramming techniques is the  Program Evaluation and Review Technique (PERT) \text {\underline{ Program Evaluation and Review Technique (PERT)} } ,similar to the Critical Path Method._________________________

(True/False)
4.8/5
(32)

Which of the following is NOT a disadvantage of the PERT method?

(Multiple Choice)
4.9/5
(33)

In reviewing behavior feasibility,you assess a candidate solution according to the likelihood that  management \text {\underline{ management} } will adopt and support a solution,rather than resisting it._________________________

(True/False)
4.9/5
(34)

An information system that is able to recognize the identity of individual users is said to provide authentication  \text {\underline{authentication } } _________________________

(True/False)
4.8/5
(40)

____ occurs when a control provides proof that a user possesses the identity that he or she claims.

(Multiple Choice)
4.8/5
(35)

Activity definition is a process in the knowledge area of time  \text {\underline{time } } ,in project management methodology._________________________

(True/False)
4.8/5
(35)

The job of a(n)____________________ is to marshal and administer resources,coordinate the completion of tasks,and handle the many roles necessary to complete the desired objectives.

(Short Answer)
4.8/5
(38)

Managing human resources in information security projects has additional complexities,including:

(Multiple Choice)
4.7/5
(34)

List and explain the critical characteristics of information.

(Essay)
4.9/5
(26)

The project plan inputs include work time,resources and project  activities \text {\underline{ activities} } ._________________________

(True/False)
4.7/5
(38)

WBS is a simple planning tool used to create a(n) project plan  \text {\underline{project plan } } ._________________________

(True/False)
5.0/5
(29)

The first step in the WBS is to identify the work to be accomplished in the task or task area; that is,the activities and ____________________.

(Short Answer)
4.8/5
(31)

Project plan inputs include work time,resources,and project ____________________.

(Short Answer)
4.9/5
(32)

____________________ security encompasses the protection of an organization's communications media,technology,and content.

(Short Answer)
4.8/5
(39)

According to the C.I.A.triangle,the three desirable characteristics of information are confidentiality,integrity,and ____.

(Multiple Choice)
4.8/5
(38)
Showing 81 - 100 of 139
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)