Deck 1: Introduction to the Management of Information Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/139
Play
Full screen (f)
Deck 1: Introduction to the Management of Information Security
1
Project team members may require special training on newly introduced technologies,and this may increase the risk of human resource turnover because personnel trained in a new,high-demand skill are more likely to leave the organization in search of better opportunities elsewhere.
False
2
Unlike ongoing operations,project management involves the short-term gathering of a group that completes the project,and whose members are then released,and perhaps assigned to other projects.
True
3
The authorization process takes place before the authentication process.
False
4
The C.I.A.triangle is an important element of the CNSS model of information security.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
5
Leadership includes supervising employee behavior,performance,attendance and attitude.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
6
When you review technological feasibility,you address the organization's financial ability to purchase the technology needed to implement a candidate solution
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
7
Only a deliberate attack,such as a virus,can result in the corruption of a file.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
8
The set of organizational guidelines that dictate certain behavior within the organization is called planning.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
9
A manager is responsible for coordinating the completion of tasks.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
10
A manager has many roles to play including informational,interpersonal,and decisional.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
11
Changing only one of the project plan elements does not usually affect the accuracy and reliability of the estimates of the other two.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
12
Information security can be both a process and a project because it is in fact a continuous series of projects.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
13
The first step in solving problems is to gather facts and make assumptions.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
14
The confidentiality of information is breached when unauthorized individuals or systems are able to access the information.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
15
The CNSS security model includes detailed guidelines and policies that direct the implementation of controls.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
16
Both autocratic and democratic leaders tend to be action-oriented.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
17
Information technology is the sole responsibility of a small,dedicated group of people in a company.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
18
Tactical planning focuses on the day-to-day operation of local resources.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
19
All managers are expected to play a leadership role.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
20
Corruption of information can occur only while information is being stored.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
21
The
of information is threatened when it is exposed to corruption,damage,or destruction._________________________
of information is threatened when it is exposed to corruption,damage,or destruction._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
22
In the WBS approach,a project plan is first broken down into a small tasks or specific action steps.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
23
The three desirable characteristics of information on which the C.I.A.triangle is founded are confidentiality,integrity,and
_________________________
_________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
24
The process of achieving objectives using a given set of resources is called
._________________________
._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
25
generally addresses the direction and motivation of the human resource._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
26
Any project manager is better served using a tool they know,rather than an overly complex one that he or she cannot use suitably.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
27
leaders tend to make decisions only when they are needed to avoid bringing the process to a complete halt._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
28
The two network scheduling techniques,the Critical Path Method and PERT,are similar in design.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
29
An effective project management software application is capable of eliminating the need for a project manager.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
30
The characteristic of information that enables a user to access it without interference or obstruction and in a useable format is
._________________________
._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
31
leaders typically seek input from all interested parties,and then formulate a position that can be supported by the majority._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
32
During the
process,a control provides proof that a user possesses the identity that he or she claims._________________________
process,a control provides proof that a user possesses the identity that he or she claims._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
33
security encompasses strategies to protect people,tangible assets,and the workplace from various threats._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
34
Popular management theory categorizes the principles of management into planning,organizing,leading and
._________________________
._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
35
security addresses the protection of an organization's data networking devices,connections,and contents._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
36
security focuses on securing the organization's ability to carry out its operational activities without interruption or compromise._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
37
The first step in solving problems is to recognize and
the problem._________________________
the problem._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
38
The protection of an organization's information assets is the primary mission of the information technology community._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
39
A project can have more than one critical path.
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
40
An information system that is able to recognize the identity of individual users is said to provide
_________________________
_________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
41
Training project team members on how to use new technologies when they are introduced
the risk of human resource turnover._________________________
the risk of human resource turnover._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
42
One method for sequencing tasks and subtasks in a project plan is known as
scheduling,referring to the collection of possible pathways to project completion from the beginning task to the ending task._________________________
scheduling,referring to the collection of possible pathways to project completion from the beginning task to the ending task._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
43
In reviewing behavior feasibility,you assess a candidate solution according to the likelihood that
will adopt and support a solution,rather than resisting it._________________________
will adopt and support a solution,rather than resisting it._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
44
A group of decision makers and/or working professionals is known as a(n)____.
A) area of interest
B) decision partner
C) community of interest
D) source of interest
A) area of interest
B) decision partner
C) community of interest
D) source of interest
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
45
are InfoSec operations that are specifically managed as separate entities._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
46
Another popular project management tool is the bar or
chart,named for its developer,who created this method in the early 1900s._________________________
chart,named for its developer,who created this method in the early 1900s._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
47
The ____ community has the lead role in protecting the organization's information assets.
A) information technology
B) information security
C) general business
D) general public
A) information technology
B) information security
C) general business
D) general public
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
48
Activity definition is a process in the knowledge area of
,in project management methodology._________________________
,in project management methodology._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
49
The ____ community allocates resources necessary for all of to the communities of interest to function properly.
A) information security
B) information technology
C) general business
D) general public
A) information security
B) information technology
C) general business
D) general public
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
50
Communications security involves the protection of an organization's ____.
A) employees
B) physical assets
C) technology
D) data network devices
A) employees
B) physical assets
C) technology
D) data network devices
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
51
The first step in the WBS is to identify the work to be accomplished in the task or task area; that is,the activities and
._________________________
._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
52
During the project execution phase,the
feedback loop or cybernetic loop ensures that progress is measured periodically._________________________
feedback loop or cybernetic loop ensures that progress is measured periodically._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
53
WBS is a simple planning tool used to create a(n)
._________________________
._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
54
are discrete sequences of activities with starting points and defined completion points._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
55
Administrative closure is a process in the knowledge area of
,in project management methodology._________________________
,in project management methodology._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
56
Physical security is concerned with the protection of the ____.
A) people within the organization
B) physical assets of the organization
C) network devices of the organization
D) data of the organization
A) people within the organization
B) physical assets of the organization
C) network devices of the organization
D) data of the organization
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
57
Among the advantages to the
method is planning large projects is made easier by facilitating the identification of pre- and post- activities._________________________
method is planning large projects is made easier by facilitating the identification of pre- and post- activities._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
58
The project plan inputs include work time,resources and project
._________________________
._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
59
The most popular of networking dependency diagramming techniques is the
,similar to the Critical Path Method._________________________
,similar to the Critical Path Method._________________________
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
60
The ____ community supplies and supports information technology appropriate to a business needs.
A) information security
B) information technology
C) general business
D) general public
A) information security
B) information technology
C) general business
D) general public
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
61
Autocratic leaders usually ____.
A) seek input from all interested parties
B) request ideas and suggestions
C) do not accept alternative viewpoints
D) sit back and allow the process to develop as it goes
A) seek input from all interested parties
B) request ideas and suggestions
C) do not accept alternative viewpoints
D) sit back and allow the process to develop as it goes
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
62
Identification is typically performed by means of a(n)____.
A) audit log
B) user name
C) cryptographic certificate
D) access control list
A) audit log
B) user name
C) cryptographic certificate
D) access control list
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
63
____ security addresses the ability to use the network to accomplish the organization's data communication functions.
A) Communications
B) Network
C) Operations
D) Physical
A) Communications
B) Network
C) Operations
D) Physical
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
64
The activation and use of access control lists is an example of the ____ process.
A) identification
B) accountability
C) authorization
D) authentication
A) identification
B) accountability
C) authorization
D) authentication
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
65
____ occurs when a control provides proof that a user possesses the identity that he or she claims.
A) Identification
B) Authentication
C) Authorization
D) Accountability
A) Identification
B) Authentication
C) Authorization
D) Accountability
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
66
Audit logs that track user activity on an information system provide ____.
A) identification
B) authorization
C) accountability
D) authentication
A) identification
B) authorization
C) accountability
D) authentication
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
67
A manager has informational,interpersonal,and ____ roles within the organization.
A) decisional
B) creative
C) security related
D) leadership
A) decisional
B) creative
C) security related
D) leadership
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
68
According to the C.I.A.triangle,the three desirable characteristics of information are confidentiality,integrity,and ____.
A) accountability
B) availability
C) authorization
D) authentication
A) accountability
B) availability
C) authorization
D) authentication
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
69
The characteristic of ____ exists when a control provides assurance that every activity undertaken can be attributed to a named person or automated process.
A) accountability
B) privacy
C) authorization
D) authentication
A) accountability
B) privacy
C) authorization
D) authentication
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
70
Strategic planning ____.
A) focuses on production planning
B) occurs at the highest levels of the organization
C) focuses on the day-to-day operation of local resources
D) occurs in the short or immediate term
A) focuses on production planning
B) occurs at the highest levels of the organization
C) focuses on the day-to-day operation of local resources
D) occurs in the short or immediate term
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
71
The process that develops,creates,and implements strategies for the accomplishment of objectives is called ____.
A) leading
B) controlling
C) organizing
D) planning
A) leading
B) controlling
C) organizing
D) planning
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
72
____ leaders are also known as "laid-back" leaders.
A) Autocratic
B) Laissez-faire
C) Democratic
D) Aristocratic
A) Autocratic
B) Laissez-faire
C) Democratic
D) Aristocratic
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
73
During the transmission of information,algorithms,hash values,and error-correcting codes help ensure the ____ of the information.
A) confidentiality
B) integrity
C) corruption
D) availability
A) confidentiality
B) integrity
C) corruption
D) availability
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
74
The protection of information and the systems and hardware that use,store,and transmit that information is known as ____.
A) security
B) information security
C) authentication
D) identification
A) security
B) information security
C) authentication
D) identification
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
75
____ of information ensures that only those with sufficient privileges and a demonstrated need may access certain information.
A) Integrity
B) Availability
C) Authentication
D) Confidentiality
A) Integrity
B) Availability
C) Authentication
D) Confidentiality
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
76
____ leaders reserve all decision-making responsibilities for themselves.
A) Autocratic
B) Democratic
C) Laissez-faire
D) Diplomatic
A) Autocratic
B) Democratic
C) Laissez-faire
D) Diplomatic
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
77
The use of cryptographic certificates to establish Secure Sockets Layer (SSL)connections is an example of the ____ process.
A) accountability
B) authorization
C) identification
D) authentication
A) accountability
B) authorization
C) identification
D) authentication
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
78
The ____ of information refers to the ability to access information without interference or obstruction and in a useable format.
A) privacy
B) confidentiality
C) integrity
D) availability
A) privacy
B) confidentiality
C) integrity
D) availability
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
79
____ is the quality or state of being whole,complete,and uncorrupted.
A) Integrity
B) Authorization
C) Security
D) Confidentiality
A) Integrity
B) Authorization
C) Security
D) Confidentiality
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck
80
An information system possesses the characteristic of ____ when it is able to recognize individual users.
A) authentication
B) identification
C) authorization
D) accountability
A) authentication
B) identification
C) authorization
D) accountability
Unlock Deck
Unlock for access to all 139 flashcards in this deck.
Unlock Deck
k this deck