100% Zufriedenheitsgarantie Sofort verfügbar nach Zahlung Sowohl online als auch als PDF Du bist an nichts gebunden
logo-home
Management of Information Security 4th Edition - Test Bank 29,33 €
In den Einkaufswagen

Prüfung

Management of Information Security 4th Edition - Test Bank

 7 mal angesehen  1 mal verkauft
  • Kurs
  • Hochschule

Test Bank For Management of Information Security 4th Edition Complete Test Bank

vorschau 4 aus 94   Seiten

  • 19. oktober 2023
  • 94
  • 2023/2024
  • Prüfung
  • Fragen & Antworten
avatar-seller
,Chapter 01 - Introduction to the Management of Information Security


TRUE/FALSE

1. Corruption of information can occur only while information is being stored.

ANS: F PTS: 1 REF: 6

2. The authorization process takes place before the authentication process.

ANS: F PTS: 1 REF: 8

3. The first step in solving problems is to gather facts and make assumptions.

ANS: F PTS: 1 REF: 12

4. Project scope management ensures that the project plan includes only those activities that are
necessary to complete it.

ANS: T PTS: 1 REF: 20

5. A project can have more than one critical path.

ANS: T PTS: 1 REF: 28


MULTIPLE CHOICE

1. Communications security involves the protection of which of the following?.
a. radio handsets c. the IT department
b. people, physical assets d. media, technology, and content
ANS: D PTS: 1 REF: 4

2. According to the C.I.A. triangle, which of the following is a desirable characteristic for computer
security?
a. accountability c. authorization
b. availability d. authentication
ANS: B PTS: 1 REF: 6

3. Which of the following is a C.I.A. characteristic that ensures that only those with sufficient privileges
and a demonstrated need may access certain information?
a. Integrity c. Authentication
b. Availability d. Confidentiality
ANS: D PTS: 1 REF: 6

4. The use of cryptographic certificates to establish Secure Sockets Layer (SSL) connections is an
example of which process?
a. accountability c. identification
b. authorization d. authentication
ANS: D PTS: 1 REF: 7-8

, 5. What do audit logs that track user activity on an information system provide?
a. identification c. accountability
b. authorization d. authentication
ANS: C PTS: 1 REF: 8

6. Which of the following is the process that develops, creates, and implements strategies for the
accomplishment of objectives?
a. leading c. organizing
b. controlling d. planning
ANS: D PTS: 1 REF: 9

7. Which of the following is the principle of management dedicated to the structuring of resources to
support the accomplishment of objectives?
a. organization c. controlling
b. planning d. leading
ANS: A PTS: 1 REF: 10

8. Which of the following is the first step in the problem-solving process?
a. Analyze and compare the possible solutions
b. Develop possible solutions
c. Recognize and define the problem
d. Select, implement and evaluate a solution
ANS: C PTS: 1 REF: 12

9. Which of the following is NOT a step in the problem-solving process?
a. Select, implement and evaluate a solution
b. Analyze and compare possible solutions
c. Build support among management for the candidate solution
d. Gather facts and make assumptions
ANS: C PTS: 1 REF: 11-13

10. Which of the following is NOT a unique function of Information Security Management?
a. planning c. project management
b. protection d. principles
ANS: D PTS: 1 REF: 13

11. Which of the following functions of Information Security Management seeks to dictate certain
behavior within the organization through a set of organizational guidelines?
a. planning c. programs
b. policy d. people
ANS: B PTS: 1 REF: 14

12. Which function of InfoSec Management encompasses security personnel as well as aspects of the
SETA program?
a. protection
b. people
c. projects
d. policy

, ANS: B PTS: 1 REF: 15

13. Information security project managers often follow methodologies based on what methodology
promoted by the Project Management Institute?
a. The Security Systems Development Life Cycle (SecSDLC)
b. The Security Project And Management Methodology (SPAMM)
c. Project Management System Methodology (PMS/Meth)
d. Project Management Body of Knowledge (PMBoK)
ANS: D PTS: 1 REF: 17-18

14. Which of the following is NOT a knowledge area in the Project Management knowledge body?
a. Integration c. Scope
b. Quality d. Technology
ANS: D PTS: 1 REF: 19

15. What is one of the most frequently cited failures in project management?
a. Overly restrictive management
b. Excessive personnel on project
c. Failure to meet project deadlines
d. Loose or ambiguous project specifications
ANS: C PTS: 1 REF: 21

16. The management of human resources must address many complicating factors; which of the following
is NOT among them?
a. All workers operate at approximately the same level of efficiency
b. Not all workers begin the project with the same degree of skill
c. Skill mixtures among the actual project workers seldom match the needs of the project
plan.
d. Some tasks may require skills that are not available from resources on hand
ANS: A PTS: 1 REF: 23

17. In the WBS approach, the project plan is first broken down into tasks placed on the WBS task list. The
minimum attributes that should be identified for each task include all but which of the following?
a. Work to be accomplished (activities and deliverables)
b. Estimated amount of effort required for completion, in hours or workdays
c. The common or specialized skills needed to perform the task
d. The number of people and other resources needed for each task
ANS: D PTS: 1 REF: 25

18. Which of the following was originally developed in the late 1950s to meet the need of the rapidly
expanding engineering projects associated with government acquisitions such as weapons systems?
a. GANTT c. CPM
b. PERT d. WBS
ANS: B PTS: 1 REF: 27

19. Using the Program Evaluation and Review Technique, which of the following identifies the sequence
of events or activities that requires the longest duration to complete, and that therefore cannot be
delayed without delaying the entire project?
a. program path c. critical path

Alle Vorteile der Zusammenfassungen von Stuvia auf einen Blick:

Garantiert gute Qualität durch Reviews

Garantiert gute Qualität durch Reviews

Stuvia Verkäufer haben mehr als 700.000 Zusammenfassungen beurteilt. Deshalb weißt du dass du das beste Dokument kaufst.

Schnell und einfach kaufen

Schnell und einfach kaufen

Man bezahlt schnell und einfach mit iDeal, Kreditkarte oder Stuvia-Kredit für die Zusammenfassungen. Man braucht keine Mitgliedschaft.

Konzentration auf den Kern der Sache

Konzentration auf den Kern der Sache

Deine Mitstudenten schreiben die Zusammenfassungen. Deshalb enthalten die Zusammenfassungen immer aktuelle, zuverlässige und up-to-date Informationen. Damit kommst du schnell zum Kern der Sache.

Häufig gestellte Fragen

Was bekomme ich, wenn ich dieses Dokument kaufe?

Du erhältst eine PDF-Datei, die sofort nach dem Kauf verfügbar ist. Das gekaufte Dokument ist jederzeit, überall und unbegrenzt über dein Profil zugänglich.

Zufriedenheitsgarantie: Wie funktioniert das?

Unsere Zufriedenheitsgarantie sorgt dafür, dass du immer eine Lernunterlage findest, die zu dir passt. Du füllst ein Formular aus und unser Kundendienstteam kümmert sich um den Rest.

Wem kaufe ich diese Zusammenfassung ab?

Stuvia ist ein Marktplatz, du kaufst dieses Dokument also nicht von uns, sondern vom Verkäufer ExamsExpert. Stuvia erleichtert die Zahlung an den Verkäufer.

Werde ich an ein Abonnement gebunden sein?

Nein, du kaufst diese Zusammenfassung nur für 29,33 €. Du bist nach deinem Kauf an nichts gebunden.

Kann man Stuvia trauen?

4.6 Sterne auf Google & Trustpilot (+1000 reviews)

45.681 Zusammenfassungen wurden in den letzten 30 Tagen verkauft

Gegründet 2010, seit 14 Jahren die erste Adresse für Zusammenfassungen

Starte mit dem Verkauf
29,33 €  1x  verkauft
  • (0)
In den Einkaufswagen
Hinzugefügt