PoIS - Practice 4

System Administration, Networking, and Security Organization is better known as __________.
SANO
SAN
SANS
SANSO
The International Society of Forensic Computer Examiners (ISFCE) offers which certifications?
Certified Computer Examiner (CCE)
Master Certified Computer Examiner (MCCE)
Both a & b
Neither a nor b
Many organizations use a(n) __________ interview to remind the employee of contractual obligations, such as nondisclosure agreements, and to obtain feedback on the employee’s tenure in the organization
Hostile
Departure
Exit
Termination
________ are hired by the organization to serve in a temporary position or to supplement the existing workforce.
Temporary employees
Consultants
Contractors
Self-employees
The CISA credential is touted by ISACA as the certification that is appropriate for all but which type of professionals?
Accounting
Security
Networking
Auditing
Like the CISSP, the SSCP certification is more applicable to the security__________ than to the security __________,
Technician, manager
Manger, engineer
Manager, technician
Technician, executive
_________ are the technically qualified individuals tasked to configure firewalls, deploy IDSs, implement security software, diagnose and troubleshoot problems, and coordinate with systems and network administrators to ensure that an organization’s security technology is properly implemented
CSOs
CISOs
Security managers
Security techinicians
According to Schwartz, Erwin, Weafer, and Briney "__________" are the real techies who create and install security solutions
Builders
Administrators
Engineers
Definers
Which of the following is not one of the categories of positions as defined by Schwartz, Erwin, Weafer, and Briney?
Definer
User
Builder
Administrator
An ideal organization fosters resilience to change.
True
False
The RFP determines the impact that a specific technology or approach can have on the organization’s information assets and what it may cost
True
False
The effective use of a DMZ is one of the primary methods of securing an organization’s networks
True
False
Project managers can reduce resistance to change by involving employees in the project plan. In the systems development parts of a project, this is referred to as __________
DMZ
SDLC
WBS
JAD
By managing the __________, the organization can reduce unintended consequences by having a process to resolve potential conflict and disruption that uncoordinated change can introduce.
Conversion process
Wrap-up
Process of change
Governance
Technology __________ guides how frequently technical systems are updated, and how technical updates are approved and funded
Wrap-up
Governance
Turnover
Changover
The __________ layer of the bull's-eye model includes computers used as servers, desktop computers, and systems used for process control and manufacturing systems
Policies
Networks
Systems
Applications
The __________ level of the bull’s-eye model establishes the ground rules for the use of all systems and describes what is appropriate and what is inappropriate; it enables all other information security components to function correctly
Policies
Networks
Systems
Applications
A __________ is usually the best approach to security project implementation
Direct changeover
Phased implementation
Pilot implementation
Parallel implementation
In a __________ implementation, the entire security system is put in place in a single office, department, or division before expanding to the rest of the organization.
Loop
Direct
Parallel
Pilot
The __________ methodology has been used by many organizations and requires that issues be addressed from the general to the specific, and that the focus be on systematic solutions instead of individual problems.
Parallel
Direct changeover
Bull's-eye
Wrap-up
 
 
In the __________ process, measured results are compared against expected results.
Negative feedback loop
Wrap-up
Direct changeover
Turnover
 
 
Many public organizations must spend all budgeted funds within the fiscal year - otherwise, the subsequent year’s budget is __________.
Increased by the unspent amount
Not affected unless the deficit is repeated
Automatically audited for questionable expenditures
Reduced by the unspent amount
A(n) __________, used to justify the project is typically prepared in the analysis phase of the SecSDLC, must be reviewed and verified prior to the development of the project plan.
RFP
WBS
SDLC
CBA
{"name":"PoIS - Practice 4", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"System Administration, Networking, and Security Organization is better known as __________., The International Society of Forensic Computer Examiners (ISFCE) offers which certifications?, Many organizations use a(n) __________ interview to remind the employee of contractual obligations, such as nondisclosure agreements, and to obtain feedback on the employee’s tenure in the organization","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker