Question 1
Tasks or action steps that come after the task at hand are called ____.Selected Answer: 
 successorsCorrect Answer: 
 successorsQuestion 2
The ____ level of the bull"s-eye model establishes the ground rules for the use of all systems and describes what is appropriate and what is inappropriate, and enables all other information security components to function correctly and have the desired effects in improving the organization"s information security program.Selected Answer: 
 PoliciesCorrect Answer: 
 PoliciesQuestion 3
A(n) ____ is usually the best approach to security project implementation.Selected Answer: 
 phased implementationCorrect Answer: 
 phased implementationQuestion 4
The ____ layer of the bull"s-eye model receives attention last.Selected Answer: 
 ApplicationsCorrect Answer: 
 ApplicationsQuestion 5
The ____________________ operations strategy involves running the new methods alongside the old methods. In general, this means running two systems concurrently.Selected Answer: 
 parallelCorrect Answer: Evaluation Method Correct Answer Case Sensitivity 
Exact Matchparallel 
Exact Matchparalel 
Exact Matchparalell 
Exact Matchparralel 
Exact Matchparrallel 
Exact Matchparrallell Response Feedback: Correct.Question 6
A(n) _____________________ is a completed document or program module that can either serve as the beginning point for a later task or become an element in the finished project.Selected Answer: 
 deliverableCorrect Answer: Evaluation Method Correct Answer Case Sensitivity 
Exact Matchdeliverable 
Exact Matchdeliverible 
Exact Matchdeleverable Response Feedback: Correct.Question 7
A concept known as project ____________________ concerns the boundaries (i.e., maximum and minimum levels) of time and effort-hours needed to deliver the planned features and quality level of the project deliverables.Selected Answer: 
 scopeCorrect Answer: Evaluation Method Correct Answer Case Sensitivity 
Exact Matchscope Response Feedback: Correct.Question 8
The primary drawback to the direct changeover approach is that if the new system fails or needs modification, users may be without services while the system"s bugs are worked out.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 9
The networks layer of the bull"s-eye model needs attention first.Selected Answer: 
 FalseCorrect Answer: 
 FalseQuestion 10
Unfreezing in the Lewin change model involves thawing out hard-and-fast habits and established procedures.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 11
Each organization determines its capital budget and the rules for managing capital spending and expenses the same way.Selected Answer: 
 FalseCorrect Answer: 
 FalseQuestion 12
Each organization has to determine its own project management methodology for IT and information security projects.Selected Answer: 
 TrueCorrect Answer: 
 TrueQuestion 13
The ____ implementation involves implementing all security improvements in a single office, department, or division, and resolving issues within that group before expanding to the rest of the organization.Selected Answer: 
 pilotCorrect Answer: 
 pilotQuestion 14
The goal of the ____ is to resolve any pending issues, critique the overall effort of the project, and draw conclusions about how to improve the process for the future.Selected Answer: 
 wrap-upCorrect Answer: 
 wrap-upQuestion 15
A(n) ____________________ is a specific point in the project plan when a task (and its action steps) that has a noticeable impact on the progress of the project plan as a whole is complete.Selected Answer: 
 milestoneCorrect Answer: Evaluation Method Correct Answer Case Sensitivity 
Exact Matchmilestone 
Exact Matchmilstone 
Exact Matchmile stone Response Feedback: Correct.
Tuesday, January 14, 2014
CIS 481-20: INTRO TO INFORM SECURITY CH10
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment