Deck 10: Implementing Information Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/78
Play
Full screen (f)
Deck 10: Implementing Information Security
1
Each organization has to determine its own project management methodology for IT and information security projects.
True
2
When an estimate is flawed, as when the number of effort-hours required is underestimated, the plan should be corrected and downstream tasks updated to reflect the change.
True
3
"Unfreezing" in the Lewin change model involves thawing hard-and-fast habits and established procedures.
True
4
The first step in the work breakdown structure (WBS) approach encompasses activities, but not deliverables.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
5
In general, the design phase is accomplished by changing the configuration and operation of the organization's information systems to make them more secure.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
6
The networks layer of the bull's eye is the outermost ring of the bull's eye.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
7
The project plan as a whole must describe how to acquire and implement the needed security controls and create a setting in which those controls achieve the desired outcomes.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
8
The budgets of public organizations are usually the product of legislation or public meetings.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
9
The work breakdown structure (WBS) can only be prepared with a complex, specialized desktop PC application.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
10
Planning for the implementation phase of a security project requires the creation of a detailed project plan.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
11
The primary drawback to the direct changeover approach is that if the new system fails or needs modification, users may be without services while the system's bugs are worked out.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
12
Every organization needs to develop an information security department or program of its own.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
13
Weak management support, with overly delegated responsibility and no champion, sentences a project to almost-certain failure.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
14
Planners need to estimate the effort required to complete each task, subtask, or action step in the project plan.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
15
The effective use of a DMZ is one of the primary methods of securing an organization's networks.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
16
The need for qualified, trained, and available personnel constrains the project plan.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
17
All organizations should designate a champion from the general management community of interest to supervise the implementation of an information security project plan.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
18
The bull's-eye model can be used to evaluate the sequence of steps taken to integrate parts of the information security blueprint into a project plan.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
19
Each for-profit organization determines its capital budget and the rules for managing capital spending and expenses the same way.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
20
The size of the organization and the normal conduct of business may preclude a large training program on new security procedures or technologies.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
21
An ideal organization fosters resilience to change. _________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
22
The primary drawback to the direct changeover approach is that if the new system fails or needs modification, users may be without services while the system's bugs are worked out. _________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
23
A direct changeover is also known as going "fast turnkey." _________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
24
Planning for the implementation phase requires the creation of a detailed request for proposal, which is often assigned either to a project manager or the project champion. _________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
25
The optimal time frame for training is usually one to three weeks before the new policies and technologies come online. _________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
26
Effective planning for information security involves:
A) collecting information about an organization's objectives.
B) collecting information about an organization's information security environment.
C) collecting information about an organization's technical architecture.
D) All of the above
A) collecting information about an organization's objectives.
B) collecting information about an organization's information security environment.
C) collecting information about an organization's technical architecture.
D) All of the above
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
27
If the task is to write firewall specifications for the preparation of a(n) __________, the planner would note that the deliverable is a specification document suitable for distribution to vendors.
A) WBS
B) CBA
C) SDLC
D) RFP
A) WBS
B) CBA
C) SDLC
D) RFP
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
28
A task or subtask becomes a(n) action step when it can be completed by one individual or skill set and when it includes a single deliverable. _________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
29
Performance management is the process of identifying and controlling the resources applied to a project as well as measuring progress and adjusting the process as progress is made toward the goal. _________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
30
The parallel operations strategy works well when an isolated group can serve as a test area, which prevents any problems with the new system dramatically interfering with the performance of the organization as a whole. _________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
31
Tasks or action steps that come after the task at hand are called __________.
A) predecessors
B) successors
C) children
D) parents
A) predecessors
B) successors
C) children
D) parents
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
32
The RFP determines the impact that a specific technology or approach can have on the organization's information assets and what it may cost. _________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
33
A proven method for prioritizing a program of complex change is the bull's-eye method. _________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
34
In the early stages of planning, the project planner should attempt to specify dates only for major employees within the project. _________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
35
Corrective action decisions are usually expressed in terms of trade-offs. _________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
36
Most information security projects require a trained project developer. _________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
37
A(n) __________ is a simple project management planning tool.
A) RFP
B) WBS
C) ISO 17799
D) SDLC
A) RFP
B) WBS
C) ISO 17799
D) SDLC
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
38
Once a project is underway, it is managed using a process known as gap analysis, which ensures that progress is measured periodically. _________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
39
The date for sending the final RFP to vendors is considered a(n) __________, because it signals that all RFP preparation work is complete.
A) intermediate step
B) resource
C) milestone
D) deliverable
A) intermediate step
B) resource
C) milestone
D) deliverable
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
40
In project planning, the tasks or action steps that come before the specific task at hand are commonly referred to as prerequisites. _________________________
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
41
The __________ methodology has been used by many organizations and requires that issues be addressed from the general to the specific, and that the focus be on systematic solutions instead of individual problems.
A) parallel
B) direct changeover
C) bull's-eye
D) wrap-up
A) parallel
B) direct changeover
C) bull's-eye
D) wrap-up
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
42
____________________ is a phenomenon in which the project manager spends more time documenting project tasks, collecting performance measurements, recording project task information, and updating project forecasts than accomplishing meaningful project work.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
43
In the __________ process, measured results are compared against expected results.
A) negative feedback loop
B) wrap-up
C) direct changeover
D) turnover
A) negative feedback loop
B) wrap-up
C) direct changeover
D) turnover
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
44
During the implementation phase, the organization translates its blueprint for information security into a project ____________________.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
45
The __________ layer of the bull's-eye model includes computers used as servers, desktop computers, and systems used for process control and manufacturing.
A) Policies
B) Networks
C) Systems
D) Applications
A) Policies
B) Networks
C) Systems
D) Applications
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
46
By managing the __________, the organization can reduce unintended consequences by having a process to resolve the potential conflict and disruption that uncoordinated change can introduce.
A) conversion process
B) wrap-up
C) process of change
D) governance
A) conversion process
B) wrap-up
C) process of change
D) governance
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
47
The goal of the __________ is to resolve any pending project-related issues, critique the overall effort of the project, and draw conclusions about how to improve the project management process for the future.
A) direct changeover
B) wrap-up
C) phased implementation
D) pilot implementation
A) direct changeover
B) wrap-up
C) phased implementation
D) pilot implementation
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
48
A(n) _____________________ is a completed document or program module that can either serve as the beginning point for a later task or become an element in the finished project.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
49
The Lewin change model includes __________.
A) unfreezing
B) moving
C) refreezing
D) All of the above
A) unfreezing
B) moving
C) refreezing
D) All of the above
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
50
A(n) __________ is used to justify that the project will be reviewed and verified prior to the development of the project plan.
A) RFP
B) WBS
C) SDLC
D) CBA
A) RFP
B) WBS
C) SDLC
D) CBA
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
51
A(n) ____________________ is a specific point in the project plan when a task that has a noticeable impact on the plan's progress is complete.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
52
Management should coordinate the organization's information security vision and objectives with the communities of ____________________ involved in the execution of the plan.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
53
A __________ is usually the best approach to security project implementation.
A) direct changeover
B) phased implementation
C) pilot implementation
D) parallel operation
A) direct changeover
B) phased implementation
C) pilot implementation
D) parallel operation
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
54
In a __________ implementation, the entire security system is put in place in a single office, department, or division before expanding to the rest of the organization.
A) loop
B) direct
C) parallel
D) pilot
A) loop
B) direct
C) parallel
D) pilot
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
55
Many public organizations must spend all budgeted funds within the fiscal year-otherwise, the subsequent year's budget is __________.
A) increased by the unspent amount
B) not affected unless the deficit is repeated
C) automatically audited for questionable expenditures
D) reduced by the unspent amount
A) increased by the unspent amount
B) not affected unless the deficit is repeated
C) automatically audited for questionable expenditures
D) reduced by the unspent amount
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
56
The __________ level of the bull's-eye model establishes the ground rules for the use of all systems and describes what is appropriate and what is inappropriate; it enables all other information security components to function correctly.
A) Policies
B) Networks
C) Systems
D) Applications
A) Policies
B) Networks
C) Systems
D) Applications
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
57
Technology __________ guides how frequently technical systems are updated, and how technical updates are approved and funded.
A) wrap-up
B) governance
C) turnover
D) changeover
A) wrap-up
B) governance
C) turnover
D) changeover
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
58
Project managers can reduce resistance to change by involving employees in the project plan. In the systems development parts of a project, this is referred to as __________.
A) DMZ
B) SDLC
C) WBS
D) JAD
A) DMZ
B) SDLC
C) WBS
D) JAD
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
59
The __________ layer of the bull's-eye model receives attention last.
A) Policies
B) Networks
C) Systems
D) Applications
A) Policies
B) Networks
C) Systems
D) Applications
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
60
Some cases of __________ are simple, such as requiring employees to begin using a new password on an announced date.
A) phased implementation
B) direct changeover
C) pilot implementation
D) wrap-up
A) phased implementation
B) direct changeover
C) pilot implementation
D) wrap-up
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
61
Regardless of an organization's information security needs, the amount of effort that can be expended depends on the available funds; therefore, a ____________________ is typically prepared in the analysis phase of the SecSDLC and must be reviewed and verified prior to the development of the project plan.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
62
The tasks or action steps that come before the specific task at hand are called ____________________.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
63
The project planner should describe the skills or personnel needed for a task, often referred to as a(n) ____________________.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
64
In systems development, JAD (____________________ development) means getting key representatives of user groups to serve as members of the development process.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
65
Project ____________________ is a description of a project's features, capabilities, functions, and quality level, and is used as the basis of a project plan.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
66
A(n) ____________________ implementation is the most common conversion strategy and involves a measured rollout of the planned system with a part of the system being brought out and disseminated across an organization before the next piece is implemented.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
67
Once a project is underway, it is managed to using a process known as a negative ____________________ loop.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
68
The ____________________ operations strategy involves running the new system concurrently with the old system.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
69
At the center of the bull's-eye model are the ____________________ used by the organization to accomplish its work.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
70
What minimum attributes for project tasks does the WBS document
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
71
What are the major steps in executing the project plan
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
72
A direct ____________________ involves stopping the old system and starting the new one without any overlap.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
73
Medium- and large-sized organizations deal with the impact of technical change on the organization's operation through a(n) ____________________ control process.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
74
What can the organization do by managing the process of change
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
75
One of the oldest models of change is the Lewin change model, which consists of three stages: unfreezing, ____________________, and refreezing.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
76
The level of resistance to ____________________ impacts the ease with which an organization is able to implement procedural and managerial changes.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
77
Tasks or action steps that come after the task at hand are called ____________________.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
78
Technology _____________________ is a complex process that organizations use to manage the impact and costs of technology implementation, innovation, and obsolescence.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck