Exam 5: Developing the Security Program

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The information security ____________________ is usually brought in when the organization makes the decision to outsource one or more aspects of its security program.

Free
(Short Answer)
5.0/5
(36)
Correct Answer:
Verified

consultant

Most information security projects require a trained project developer._________________________

Free
(True/False)
4.9/5
(32)
Correct Answer:
Verified

False

The work breakdown structure (WBS)can only be prepared with a complex specialized desktop PC application.

Free
(True/False)
4.9/5
(36)
Correct Answer:
Verified

False

Each organization has to determine its own project management methodology for IT and information security projects.

(True/False)
4.9/5
(35)

An organization carries out a risk ____________________ function to evaluate risks present in IT initiatives and/or systems.

(Short Answer)
4.9/5
(38)

The goal of a security ____________________ program is to keep information security at the forefront of users' minds on a daily basis.

(Short Answer)
4.8/5
(23)

The project planner should describe the skills or personnel needed for a task,often referred to as a(n)____________________,needed to accomplish a task.

(Short Answer)
4.7/5
(39)

What is the security education,training,and awareness program? Describe how the program aims to enhance security.

(Essay)
4.8/5
(37)

The three methods for selecting or developing advanced technical training are by job category,by job function,and by ____________________.

(Short Answer)
4.9/5
(34)

What are some of the variables that determine how a given organization chooses to construct its InfoSec program?

(Essay)
4.9/5
(33)

Which of the following is true about a company's InfoSec awareness Web site?

(Multiple Choice)
4.8/5
(26)

Which security functions are normally performed by IT groups outside the InfoSec area of management control?

(Essay)
4.8/5
(32)

The ____________________ program is designed to reduce the occurrence of accidental security breaches by members of the organization.

(Short Answer)
4.9/5
(35)

The first step in the work breakdown structure (WBS)approach encompasses activities,but not deliverables.

(True/False)
4.8/5
(33)

Legal assessment for the implementation of the information security program is almost always done by the information security or IT departments.

(True/False)
4.7/5
(30)

Which of the following is an advantage of the user support group form of training?

(Multiple Choice)
4.8/5
(37)

A(n)____________________ is a specific point in the project plan when a task that has a noticeable impact on plan's the progress is complete.

(Short Answer)
4.7/5
(33)

What is the role of help desk personnel in the InfoSec team?

(Essay)
4.8/5
(36)

What is the Chief Information Security Office primarily responsible for?

(Essay)
4.8/5
(32)

Which of the following is the most cost-effective method for disseminating security information and news to employees?

(Multiple Choice)
4.8/5
(41)
Showing 1 - 20 of 55
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)