Filters
Question type

The budgets of public organizations are usually the product of legislation or public meetings.

Correct Answer

verifed

verified

All organizations should designate a champion from the general management community of interest to supervise the implementation of an information security project plan.

Correct Answer

verifed

verified

A(n) ____________________ is a specific point in the project plan when a task that has a noticeable impact on the plan's progress is complete.

Correct Answer

verifed

verified

The bull's-eye model can be used to evaluate the sequence of steps taken to integrate parts of the information security blueprint into a project plan.

Correct Answer

verifed

verified

What are the major steps in executing the project plan?

Correct Answer

verifed

verified

The major steps in executing t...

View Answer

Medium- and large-sized organizations deal with the impact of technical change on the organization's operation through a(n) ____________________ control process.

Correct Answer

verifed

verified

The primary drawback to the direct changeover approach is that if the new system fails or needs modification, users may be without services while the system's bugs are worked out. _________________________

Correct Answer

verifed

verified

Regardless of an organization's information security needs, the amount of effort that can be expended depends on the available funds; therefore, a ____________________ is typically prepared in the analysis phase of the SecSDLC and must be reviewed and verified prior to the development of the project plan.

Correct Answer

verifed

verified

CBA
cost-benefit analysis
cost...

View Answer

Once a project is underway, it is managed to completion using a process known as a negative ____________________ loop.

Correct Answer

verifed

verified

The networks layer of the bull's eye is the outermost ring of the bull's eye.

Correct Answer

verifed

verified

The RFP determines the impact that a specific technology or approach can have on the organization's information assets and what it may cost. _________________________

Correct Answer

verifed

verified

Most information security projects require a trained project developer. _________________________

Correct Answer

verifed

verified

The project planner should describe the skills or personnel needed for a task, often referred to as a(n) ____________________.

Correct Answer

verifed

verified

A(n) __________ is a simple project management planning tool.


A) RFP
B) WBS
C) ISO 17799
D) SDLC

Correct Answer

verifed

verified

In a __________ implementation, the entire security system is put in place in a single office, department, or division before expanding to the rest of the organization.


A) loop
B) direct
C) parallel
D) pilot

Correct Answer

verifed

verified

A(n) __________ is used to justify that the project will be reviewed and verified prior to the development of the project plan.


A) RFP
B) WBS
C) SDLC
D) CBA

Correct Answer

verifed

verified

By managing the __________, the organization can reduce unintended consequences by having a process to resolve the potential conflict and disruption that uncoordinated change can introduce.


A) conversion process
B) wrap-up
C) process of change
D) governance

Correct Answer

verifed

verified

The need for qualified, trained, and available personnel constrains the project plan.

Correct Answer

verifed

verified

What minimum attributes for project tasks does the WBS document?

Correct Answer

verifed

verified

Work to be accomplished (activ...

View Answer

Project ____________________ is a description of a project's features, capabilities, functions, and quality level, and is used as the basis of a project plan.

Correct Answer

verifed

verified

Showing 41 - 60 of 78

Related Exams

Show Answer