Ch.10

¡Supera tus tareas y exámenes ahora con Quizwiz!

A(n) __________ is a simple project management planning tool.

WBS

Weak management support, with overly delegated responsibility and no champion, sentences a project to almost-certain failure.

true

When an estimate is flawed, as when the number of effort-hours required is underestimated, the plan should be corrected and downstream tasks updated to reflect the change.

true

A __________ is usually the best approach to security project implementation.

phased implementation

By managing the __________, the organization can reduce unintended consequences by having a process to resolve the potential conflict and disruption that uncoordinated change can introduce.

process of change

Many public organizations must spend all budgeted funds within the fiscal year—otherwise, the subsequent year's budget is __________.

reduced by the unspent amount

Planning for the implementation phase of a security project requires the creation of a detailed project plan.

true

The bull's-eye model can be used to evaluate the sequence of steps taken to integrate parts of the information security blueprint into a project plan.

true

In the early stages of planning, the project planner should attempt to specify completion dates only for major employees within the project.

false

Most information security projects require a trained project developer.

false

Performance management is the process of identifying and controlling the resources applied to a project as well as measuring progress and adjusting the process as progress is made toward the goal.

false

Planning for the implementation phase requires the creation of a detailed request for proposal, which is often assigned either to a project manager or the project champion.

false

The RFP determines the impact that a specific technology or approach can have on the organization's information assets and what it may cost.

false

The first step in the work breakdown structure (WBS) approach encompasses activities, but not deliverables.

false

The networks layer of the bull's eye is the outermost ring of the bull's eye.

false

The parallel operations strategy works well when an isolated group can serve as a test area, which prevents any problems with the new system dramatically interfering with the performance of the organization as a whole.

false

The work breakdown structure (WBS) can only be prepared with a complex, specialized desktop PC application.

false

The effective use of a DMZ is one of the primary methods of securing an organization's networks.

true

The need for qualified, trained, and available personnel constrains the project plan.

true

The primary drawback to the direct changeover approach is that if the new system fails or needs modification, users may be without services while the system's bugs are worked out.

true

The project plan as a whole must describe how to acquire and implement the needed security controls and create a setting in which those controls achieve the desired outcomes.

true

The goal of the __________ is to resolve any pending project-related issues, critique the overall effort of the project, and draw conclusions about how to improve the project management process for the future.

wrap-up

A(n) __________ is used to justify that the project will be reviewed and verified prior to the development of the project plan.

CBA

Project managers can reduce resistance to change by involving employees in the project plan. In the systems development parts of a project, this is referred to as __________.

JAD

Effective planning for information security involves:

all of the above

The Lewin change model includes __________.

all of the above

The __________ methodology has been used by many organizations and requires that issues be addressed from the general to the specific, and that the focus be on systematic solutions instead of individual problems.

bull's-eye

Some cases of __________ are simple, such as requiring employees to begin using a new password on an announced date.

direct changeover

A direct changeover is also known as going " fast turnkey."

false

Each for-profit organization determines its capital budget and the rules for managing capital spending and expenses the same way.

false

Every organization needs to develop an information security department or program of its own.

false

In general, the design phase is accomplished by changing the configuration and operation of the organization's information systems to make them more secure.

false

In project planning, the tasks or action steps that come before the specific task at hand are commonly referred to as prerequisites.

false

In the early stages of planning, the project planner should attempt to specify completion dates only for major employees within the project

false

If the task is to write firewall specifications for the preparation of a(n) __________, the planner would note that the deliverable is a specification document suitable for distribution to vendors.

RFP

Technology __________ guides how frequently technical systems are updated, and how technical updates are approved and funded.

governance

In the __________ process, measured results are compared against expected results.

negative feedback loop

Tasks or action steps that come after the task at hand are called __________.

successors

"Unfreezing" in the Lewin change model involves thawing hard-and-fast habits and established procedures.

true

A proven method for prioritizing a program of complex change is the bull's-eye method.

true

A task or subtask becomes a(n) action step when it can be completed by one individual or skill set and when it includes a single deliverable.

true

An ideal organization fosters resilience to change.

true

Corrective action decisions are usually expressed in terms of trade-offs.

true

Each organization has to determine its own project management methodology for IT and information security projects.

true

Once a project is underway, it is managed using a process known as gap analysis, which ensures that progress is measured periodically.

true

Planners need to estimate the effort required to complete each task, subtask, or action step in the project plan.

true


Conjuntos de estudio relacionados

ABM Microeconomics 1041 Chapter 1

View Set

insurance license course final exam

View Set

Apprentice Lineman General Knowledge

View Set

National Counseling Examination Study Guide

View Set

Chapter 21 Quiz: Spring 2021 BIO-215-OL-A: Nutrition

View Set

ACCT 5312 Final Exam (Chapters 9-11)

View Set