Management of Information security
Information technology is the sole responsibility of a small, dedicated group of people in a company
True
False
The CNSS security model includes detailed guidelines and policies that direct the implementation of the controls
True
False
The confidentiality of the information is breached when unauthorized individuals or systems are able to access the information
True
False
When you review technological feasibility, you address the organization's financial ability to purchase the technology needed to implement a candidate solution
True
False
The set of organizational guidelines that dictate certain behavior within the organization is called planning
True
False
Information security can be both a process and a project because it is in fact a continuous series of projects
True
False
Unlike ongoing operations, project management involves the short-term gathering of a group that completes the project, and whose members are then released, and perhaps assigned to other projects
True
False
Changing only one of the project plan elements does not usually affect the accuracy and reliability of the estimates of the other two
T
F
Project team members may require special training on newly introduced technologies, and this may increase the risk of human resource turnover because personnel trained in a new, high-demand skill are more likely to leave the organization in search of better opportunities elsewhere
T
F
In the WBS approach, a project plan is first broken down into a small tasks or specific action steps.
T
F
An effective project management software application is capable of eliminating the need for a project manager.
T
F
Any project manager is better served using a tool they know, rather than an overly complex one that he or she cannot use suitably.
T
F
The protection of an organization’s information assets is the primary mission of the information technology community.
T
F
Network security encompasses strategies to protect people, tangible assets, and the workplace from various threats.
T
F
Operations security focuses on securing the organization’s ability to carry out its operational activities without interruption or compromise.
T
F
Communications security addresses the protection of an organization’s data networking devices, connections, and contents.
T
F
1) Policy, 2) awareness, training and education, and 3) technology are concepts vital for the protection of information.
T
F
The three desirable characteristics of information on which the C.I.A. Triangle is founded are confidentiality, integrity, and authorization.
T
F
The integrity of information is threatened when it is exposed to corruption, damage, or destruction.
T
F
The characteristic of information that enables a user to access it without interference or obstruction and in a useable format is confidentiality.
T
F
An information system that is able to recognize the identity of individual users is said to provide authentication.
T
F
During the identification process, a control provides proof that a user possesses the identity that he or she claims.
T
F
Autocratic leaders typically seek input from all interested parties, and then formulate a position that can be supported by the majority.
T
F
Democratic leaders tend to make decisions only when they are needed to avoid bringing the process to a complete halt.
T
F
Popular management theory categorizes the principles of management into planning, organizing, leading and controlling.
T
F
In reviewing behavior feasibility, you assess a candidate solution according to the likelihood that management will adopt and support a solution, rather than resisting it.
T
F
Operations are discrete sequences of activities with starting points and defined completion points.
T
F
Activity definition is a process in the knowledge area of time, in project management methodology.
T
F
Administrative closure is a process in the knowledge area of communications, in project management methodology.
T
F
During the project execution phase, the positive feedback loop or cybernetic loop ensures that progress is measured periodically.
T
F
{"name":"Management of Information security", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Information technology is the sole responsibility of a small, dedicated group of people in a company, The CIA triangle is an important element of the CNSS model of information security, The CNSS security model includes detailed guidelines and policies that direct the implementation of the controls","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
More Quizzes
Do You Really Know Wings of Fire?
1268
What NOT to do on holiday! by BBC Newsbeat
840
Funding Pathway
520
QUIZ MANTERA ARMADA SDN BHD
11612
What is innovation ?
100
Co owner search
1050
DSP
100
Rio Olympics
1050
Are You a Procrastinator?
15853
Quiz for Player Empire 3 :(Dynastie Age)
320
Choose the correct option
740
New url!
100