Filters
Question type

Study Flashcards

On-the-job training can result in substandard work performance while the trainee gets up to speed.

A) True
B) False

Correct Answer

verifed

verified

Which of the following would be responsible for configuring firewalls and IDPSs,implementing security software,and diagnosing and troubleshooting problems?


A) A security technician
B) A security analyst
C) A security consultant
D) The security manager

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

What are the four areas into which it is recommended to separate the functions of security?

Correct Answer

verifed

verified

Functions performed by nontechnology bus...

View Answer

Threats from insiders are more likely in a small organization than in a large one.

A) True
B) False

Correct Answer

verifed

verified

____________________ is a phenomenon in which the project manager spends more time documenting project tasks,collecting performance measurements,recording project task information,and updating project completion forecasts than in accomplishing meaningful project work.

Correct Answer

verifed

verified

Which of the following functions needed to implement the information security program evaluates patches used to close software vulnerabilities and acceptance testing of new systems to assure compliance with policy and effectiveness?


A) Systems testing
B) Risk assessment
C) Incident response
D) Systems security administration

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Planners need to estimate the effort required to complete each task,subtask,or action step.

A) True
B) False

Correct Answer

verifed

verified

__________ is a simple project management planning tool.


A) RFP
B) WBS
C) ISO 17799
D) SDLC

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is an advantage of the formal class method of training?


A) Personal
B) Self-paced, can go as fast or as slow as the trainee needs
C) Can be scheduled to fit the needs of the trainee
D) Interaction with trainer is possible

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following is the first step in the process of implementing training?


A) Identify training staff
B) Identify target audiences
C) Identify program scope, goals, and objectives
D) Motivate management and employees

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Which of the following functions includes identifying the sources of risk and may include offering advice on controls that can reduce risk?


A) Risk management
B) Risk assessment
C) Systems testing
D) Vulnerability assessment

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

A SETA program consists of three elements: security education,security training,and which of the following?.


A) security accountability
B) security authentication
C) security awareness
D) security authorization

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Which of the following is an advantage of the one-on-one method of training?


A) Trainees can learn from each other
B) Very cost-effective
C) Customized
D) Maximizes use of company resources

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Explain the conflict between the goals and objectives of the CIO and the CISO.

Correct Answer

verifed

verified

The CIO,as the executive in charge of th...

View Answer

What minimum attributes for project tasks does the WBS document?

Correct Answer

verifed

verified

Work to be accomplished (activities and ...

View Answer

The security education,training,and awareness (SETA)program is designed to reduce the occurence of external security attacks.

A) True
B) False

Correct Answer

verifed

verified

A task or subtask becomes a(n) action step when it can be completed by one individual or skill set and when it includes a single deliverable._________________________

A) True
B) False

Correct Answer

verifed

verified

What is the SETA program designed to do?


A) reduce the occurrence of external attacks
B) improve operations
C) reduce the occurence of accidental security breaches
D) increase the efficiency of InfoSec staff

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A study of information security positions found that positions can be classified into one of three types: ____________________ are the real technical types,who create and install security solutions.

Correct Answer

verifed

verified

What are the components of the security program element described as preparing for contingencies and disasters?

Correct Answer

verifed

verified

Business plan,identi...

View Answer

Showing 21 - 40 of 55

Related Exams

Show Answer