100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Management of Information Security 4th Edition - Test Bank $32.37   Add to cart

Exam (elaborations)

Management of Information Security 4th Edition - Test Bank

 6 views  1 purchase
  • Course
  • Institution

Test Bank For Management of Information Security 4th Edition Complete Test Bank

Preview 4 out of 94  pages

  • October 19, 2023
  • 94
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
,Chapter 01 - Introduction to the Management of Information Security


TRUE/FALSE

1. Corruption of information can occur only while information is being stored.

ANS: F PTS: 1 REF: 6

2. The authorization process takes place before the authentication process.

ANS: F PTS: 1 REF: 8

3. The first step in solving problems is to gather facts and make assumptions.

ANS: F PTS: 1 REF: 12

4. Project scope management ensures that the project plan includes only those activities that are
necessary to complete it.

ANS: T PTS: 1 REF: 20

5. A project can have more than one critical path.

ANS: T PTS: 1 REF: 28


MULTIPLE CHOICE

1. Communications security involves the protection of which of the following?.
a. radio handsets c. the IT department
b. people, physical assets d. media, technology, and content
ANS: D PTS: 1 REF: 4

2. According to the C.I.A. triangle, which of the following is a desirable characteristic for computer
security?
a. accountability c. authorization
b. availability d. authentication
ANS: B PTS: 1 REF: 6

3. Which of the following is a C.I.A. characteristic that ensures that only those with sufficient privileges
and a demonstrated need may access certain information?
a. Integrity c. Authentication
b. Availability d. Confidentiality
ANS: D PTS: 1 REF: 6

4. The use of cryptographic certificates to establish Secure Sockets Layer (SSL) connections is an
example of which process?
a. accountability c. identification
b. authorization d. authentication
ANS: D PTS: 1 REF: 7-8

, 5. What do audit logs that track user activity on an information system provide?
a. identification c. accountability
b. authorization d. authentication
ANS: C PTS: 1 REF: 8

6. Which of the following is the process that develops, creates, and implements strategies for the
accomplishment of objectives?
a. leading c. organizing
b. controlling d. planning
ANS: D PTS: 1 REF: 9

7. Which of the following is the principle of management dedicated to the structuring of resources to
support the accomplishment of objectives?
a. organization c. controlling
b. planning d. leading
ANS: A PTS: 1 REF: 10

8. Which of the following is the first step in the problem-solving process?
a. Analyze and compare the possible solutions
b. Develop possible solutions
c. Recognize and define the problem
d. Select, implement and evaluate a solution
ANS: C PTS: 1 REF: 12

9. Which of the following is NOT a step in the problem-solving process?
a. Select, implement and evaluate a solution
b. Analyze and compare possible solutions
c. Build support among management for the candidate solution
d. Gather facts and make assumptions
ANS: C PTS: 1 REF: 11-13

10. Which of the following is NOT a unique function of Information Security Management?
a. planning c. project management
b. protection d. principles
ANS: D PTS: 1 REF: 13

11. Which of the following functions of Information Security Management seeks to dictate certain
behavior within the organization through a set of organizational guidelines?
a. planning c. programs
b. policy d. people
ANS: B PTS: 1 REF: 14

12. Which function of InfoSec Management encompasses security personnel as well as aspects of the
SETA program?
a. protection
b. people
c. projects
d. policy

, ANS: B PTS: 1 REF: 15

13. Information security project managers often follow methodologies based on what methodology
promoted by the Project Management Institute?
a. The Security Systems Development Life Cycle (SecSDLC)
b. The Security Project And Management Methodology (SPAMM)
c. Project Management System Methodology (PMS/Meth)
d. Project Management Body of Knowledge (PMBoK)
ANS: D PTS: 1 REF: 17-18

14. Which of the following is NOT a knowledge area in the Project Management knowledge body?
a. Integration c. Scope
b. Quality d. Technology
ANS: D PTS: 1 REF: 19

15. What is one of the most frequently cited failures in project management?
a. Overly restrictive management
b. Excessive personnel on project
c. Failure to meet project deadlines
d. Loose or ambiguous project specifications
ANS: C PTS: 1 REF: 21

16. The management of human resources must address many complicating factors; which of the following
is NOT among them?
a. All workers operate at approximately the same level of efficiency
b. Not all workers begin the project with the same degree of skill
c. Skill mixtures among the actual project workers seldom match the needs of the project
plan.
d. Some tasks may require skills that are not available from resources on hand
ANS: A PTS: 1 REF: 23

17. In the WBS approach, the project plan is first broken down into tasks placed on the WBS task list. The
minimum attributes that should be identified for each task include all but which of the following?
a. Work to be accomplished (activities and deliverables)
b. Estimated amount of effort required for completion, in hours or workdays
c. The common or specialized skills needed to perform the task
d. The number of people and other resources needed for each task
ANS: D PTS: 1 REF: 25

18. Which of the following was originally developed in the late 1950s to meet the need of the rapidly
expanding engineering projects associated with government acquisitions such as weapons systems?
a. GANTT c. CPM
b. PERT d. WBS
ANS: B PTS: 1 REF: 27

19. Using the Program Evaluation and Review Technique, which of the following identifies the sequence
of events or activities that requires the longest duration to complete, and that therefore cannot be
delayed without delaying the entire project?
a. program path c. critical path

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ExamsExpert. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $32.37. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78600 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$32.37  1x  sold
  • (0)
  Add to cart