Exam 5: Developing the Security Program

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____________________ is a phenomenon in which the project manager spends more time documenting project tasks,collecting performance measurements,recording project task information,and updating project completion forecasts than in accomplishing meaningful project work.

(Short Answer)
4.7/5
(33)

The information security ____________________ is usually brought in when the organization makes the decision to outsource one or more aspects of its security program.

(Short Answer)
4.7/5
(44)

What is the security education,training,and awareness program? Describe how the program aims to enhance security.

(Essay)
4.9/5
(32)

What is the Chief Information Security Office primarily responsible for?

(Essay)
4.7/5
(35)

An organization's information security program refers to the entire set of activities,resources,personnel,and technologies used by an organization to manage the risks to the information  _______ of the organization.

(Short Answer)
4.9/5
(39)

What is the purpose of a security awareness program?  What advantage does an awareness program have for the InfoSec program?

(Essay)
4.8/5
(38)

A SETA program consists of three elements: security education,security training,and which of the following?.

(Multiple Choice)
4.9/5
(33)

The work breakdown structure (WBS)can only be prepared with a complex specialized desktop PC application.

(True/False)
4.8/5
(33)

The purpose of SETA is to enhance security in all but which of the following ways? 

(Multiple Choice)
4.8/5
(36)

What minimum attributes for project tasks does the WBS document?

(Essay)
4.7/5
(36)

Which of the following variables is the most influential in determining how to structure an information security program? 

(Multiple Choice)
4.8/5
(28)

Advanced technical training can be selected or developed based on which of the following? 

(Multiple Choice)
4.9/5
(27)

What is the role of help desk personnel in the InfoSec team?

(Essay)
4.9/5
(35)

Which security functions are normally performed by IT groups outside the InfoSec area of management control?

(Essay)
4.8/5
(27)

Explain the conflict between the goals and objectives of the CIO and the CISO.

(Essay)
4.9/5
(27)

__________ is a simple project management planning tool.

(Multiple Choice)
4.9/5
(29)

Which of the following is the most cost-effective method for disseminating security information and news to employees? 

(Multiple Choice)
4.9/5
(39)

In larger organizations,responsible for some aspect of information security; in smaller organizations,this title may be assigned to the only or senior security administrator.

(Multiple Choice)
4.7/5
(36)

Which of the following functions includes identifying the sources of risk and may include offering advice on controls that can reduce risk? 

(Multiple Choice)
5.0/5
(43)

Which of the following would be responsible for configuring firewalls and IDPSs,implementing security software,and diagnosing and troubleshooting problems? 

(Multiple Choice)
4.9/5
(26)
Showing 21 - 40 of 65
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)