Filters
Question type

Study Flashcards

____________________ is a phenomenon in which the project manager spends more time documenting project tasks,collecting performance measurements,recording project task information,and updating project completion forecasts than in accomplishing meaningful project work.

Correct Answer

verifed

verified

Which of the following is the most cost-effective method for disseminating security information and news to employees? 


A)  distance learning seminars
B)  security-themed Web site 
C)  conference calls
D)  security newsletter

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which of the following functions includes identifying the sources of risk and may include offering advice on controls that can reduce risk? 


A)  Risk management
B)  Risk assessment 
C)  Systems testing
D)  Vulnerability assessment

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

What is the purpose of a security awareness program?  What advantage does an awareness program have for the InfoSec program?

Correct Answer

verifed

verified

A security awareness program keeps InfoS...

View Answer

What minimum attributes for project tasks does the WBS document?

Correct Answer

verifed

verified

Work to be accomplished (activities and ...

View Answer

Which of the following would be responsible for configuring firewalls and IDPSs,implementing security software,and diagnosing and troubleshooting problems? 


A)  A security technician
B)  A security analyst 
C)  A security consultant
D)  The security manager

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

What is the role of help desk personnel in the InfoSec team?

Correct Answer

verifed

verified

An important part of the InfoSec team is...

View Answer

What is the security education,training,and awareness program? Describe how the program aims to enhance security.

Correct Answer

verifed

verified

The security education,training,and awar...

View Answer

The information security ____________________ is usually brought in when the organization makes the decision to outsource one or more aspects of its security program.

Correct Answer

verifed

verified

In larger organizations,responsible for some aspect of information security; in smaller organizations,this title may be assigned to the only or senior security administrator.


A)  InfoSec program
B)  SETA
C)  scope creep
D)  security watchstander
E)  security manager
F)  CISO
G)  projectitis
H)  critical path method
I)  security technicians
J)  security awareness program

K) B) and H)
L) A) and J)

Correct Answer

verifed

verified

Which security functions are normally performed by IT groups outside the InfoSec area of management control?

Correct Answer

verifed

verified

Systems security adm...

View Answer

A SETA program consists of three elements: security education,security training,and which of the following?.


A)  security accountability
B)  security authentication 
C)  security awareness
D)  security authorization

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

The work breakdown structure (WBS)can only be prepared with a complex specialized desktop PC application.

A) True
B) False

Correct Answer

verifed

verified

Advanced technical training can be selected or developed based on which of the following? 


A)  level of previous education
B)  level of previous training 
C)  technology product
D)  number of employees

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Explain the conflict between the goals and objectives of the CIO and the CISO.

Correct Answer

verifed

verified

The CIO,as the executive in charge of th...

View Answer

Which of the following variables is the most influential in determining how to structure an information security program? 


A)  Security capital budget
B)  Organizational size 
C)  Security personnel budget
D)  Organizational culture

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

The purpose of SETA is to enhance security in all but which of the following ways? 


A)  by building in-depth knowledge 
B)  by adding barriers 
C)  by developing skills 
D)  by improving awareness

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is the Chief Information Security Office primarily responsible for?

Correct Answer

verifed

verified

The CISO  is primarily respons...

View Answer

__________ is a simple project management planning tool.


A)  RFP
B)  WBS 
C)  ISO 17799
D)  SDLC

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

An organization's information security program refers to the entire set of activities,resources,personnel,and technologies used by an organization to manage the risks to the information  _______ of the organization.

Correct Answer

verifed

verified

Showing 21 - 40 of 65

Related Exams

Show Answer