Exam 1: Introduction to the Management of Information Security
Exam 1: Introduction to the Management of Information Security139 Questions
Exam 2: Planning for Security123 Questions
Exam 3: Planning for Contingencies114 Questions
Exam 4: Information Security Policy133 Questions
Exam 5: Developing the Security Program133 Questions
Exam 6: Security Management Models120 Questions
Exam 7: Security Management Practices114 Questions
Exam 8: Risk Management: Identifying and Assessing Risk78 Questions
Exam 9: Risk Management: Controlling Risk105 Questions
Exam 10: Protection Mechanisms133 Questions
Exam 11: Personnel and Security133 Questions
Exam 12: Law and Ethics113 Questions
Select questions type
Among the advantages to the
method is planning large projects is made easier by facilitating the identification of pre- and post- activities._________________________
(True/False)
4.9/5
(38)
Which of the following Principles of Information Security Management seeks to dictate certain behavior within the organization through a set of organizational guidance?
(Multiple Choice)
4.9/5
(36)
In the Program Evaluation and Review Technique,by identifying the sequence of events or activities that requires the longest duration to complete,and that therefore cannot be delayed without delaying the entire project,you have identified the ____.
(Multiple Choice)
4.7/5
(40)
The ____ community has the lead role in protecting the organization's information assets.
(Multiple Choice)
4.8/5
(32)
Only a deliberate attack,such as a virus,can result in the corruption of a file.
(True/False)
4.8/5
(26)
The confidentiality of information is breached when unauthorized individuals or systems are able to access the information.
(True/False)
4.8/5
(33)
During the transmission of information,algorithms,hash values,and error-correcting codes help ensure the ____ of the information.
(Multiple Choice)
5.0/5
(35)
It is possible to take a very complex operation and diagram it in PERT if you can answer three key questions about each activity.Which of the following is NOT one of them?
(Multiple Choice)
4.8/5
(33)
____ is one of the most frequently cited failures in project management.
(Multiple Choice)
4.9/5
(31)
Information security can be both a process and a project because it is in fact a continuous series of projects.
(True/False)
4.8/5
(33)
Popular management theory categorizes the principles of management into planning,organizing,leading and
._________________________
(True/False)
4.9/5
(37)
In the WBS approach,a project plan is first broken down into a small tasks or specific action steps.
(True/False)
4.8/5
(37)
The ____________________ community supports the business objectives of an organization by supplying and supporting information technology appropriate to the businesss' needs.
(Short Answer)
4.7/5
(38)
Information technology is the sole responsibility of a small,dedicated group of people in a company.
(True/False)
4.9/5
(37)
The three levels of planning are strategic planning,tactical planning,and ____________________ planning.
(Short Answer)
4.8/5
(34)
____ occurs when the project manager spends more time documenting project tasks,collecting performance measurements,recording project task information,and updating project completion forecasts than accomplishing meaningful project work.
(Multiple Choice)
5.0/5
(33)
A group of decision makers and/or working professionals is known as a(n)____.
(Multiple Choice)
4.8/5
(43)
Information security project managers often follow methodologies based on what methodology promoted by the Project Management Institute?
(Multiple Choice)
4.8/5
(35)
The set of organizational guidelines that dictate certain behavior within the organization is called planning.
(True/False)
4.9/5
(34)
Showing 121 - 139 of 139
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)