Info Sec Chapter 10 Implementing Security

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The networks layer of the bull's-eye is the outermost ring of the bull's eye. A) True B) False

b) false [bulls-eye is the center]

A __________ is usually the best approach to security project implementation. A) direct changeover B) phased implementation C) pilot implementation D) parallel operation

b)phased implementation

The goal of the __________ is to resolve any pending project-related issues, critique the overall effort of the project, and draw conclusions about how to improve the project management process for the future. A) direct changeover B) wrap-up C) phased implementation D) pilot implementation

b)wrap up

The __________ layer of the bull's-eye model includes computers used as servers, desktop computers, and systems used for process control and manufacturing systems. A) Policies B) Networks C) Systems D) Applications

c)systems

The first step in the work breakdown structure (WBS) approach encompasses activities, but not deliverables. A) True B) False

false

The RFP determines the impact that a specific technology or approach can have on the organization's information assets and what it may cost. _________________________ A) True B) False

false [CBA-cost benefit analysis]

A proven method for prioritizing a program of complex change is the bull's-eye method. _________________________ A) True B) False

true

A task or subtask becomes a(n) action step when it can be completed by one individual or skill set and when it includes a single deliverable. _________________________ A) True B) False

true

An ideal organization fosters resilience to change. _________________________ A) True B) False

true

Corrective action decisions are usually expressed in terms of trade-offs. _________________________ A) True B) False

true

Planners need to estimate the effort required to complete each task, subtask, or action step. A) True B) False

true

The primary drawback to the direct changeover approach is that if the new system fails or needs modification, users may be without services while the system's bugs are worked out. A) True B) False

true

Unfreezing in the Lewin change model involves thawing hard-and-fast habits and established procedures. A) True B) False

true

__________ is a simple project management planning tool. A) RFP B) WBS C) ISO 17799 D) SDLC

B) WBS [work breakdown schedule]

Tasks or action steps that come after the task at hand are called __________. A) predecessors B) successors C) children D) parents

B)successors

Project managers can reduce resistance to change by involving employees in the project plan. In the systems development parts of a project, this is referred to as __________. A) DMZ B) SDLC C) WBS D) JAD

D) JAD [joint application development]

If the task is to write firewall specifications for the preparation of a(n) __________, the planner would note that the deliverable is a specification document suitable for distribution to vendors. A) WBS B) CBA C) SDLC D) RFP

D) RFP [request for proposal]

A(n) __________, used to justify the project is typically prepared in the analysis phase of the SecSDLC, must be reviewed and verified prior to the development of the project plan. A) RFP B) WBS C) SDLC D) CBA

D)CBA

The SecSDLC involves which of the following activities? A) ​collecting information about an organization's objectives B) ​​collecting information about an organization's information security environment C) ​​collecting information about an organization's technical architecture D) ​all of the above

D)all of above

Every organization needs to develop an information security department or program of its own. A) True B) False

FALSE


Ensembles d'études connexes

Unit 2 Quiz 7 - Blood Vessels of the Upper Limb

View Set

Reproduction & Development FINISH AND Switch to NOTION

View Set

Question 8, Question 15, Question 16

View Set

Iggy Chapter 62: Care of Patients With Pituitary and Adrenal Gland Problems

View Set

Thomas Jefferson (3rd President)

View Set