Quiz #1 Study Guide-Practice Quiz
Quiz #1 Study Guide-Practice Quiz IST-456
Popular in Information Security Management
One Day of Notes
HIST 1120 - European Civ in World Context
verified elite notetaker
verified elite notetaker
Popular in Department
This 3 page Study Guide was uploaded by Matt Curtis on Tuesday February 3, 2015. The Study Guide belongs to IST-456 at Pennsylvania State University taught by Dr. Gerry Santoro in Spring2015. Since its upload, it has received 1114 views.
Reviews for Quiz #1 Study Guide-Practice Quiz
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 02/03/15
IST 456 3 January 2015 Topic 1 Quiz Study Guide 1 A group of decision makers andor working professionals is known as an a Area of interest b Decision partner 0 Community of interest 1 Source of interest 2 According to the CIA Triangle the three desirable characteristics of information are confidentiality integrity and a Accountability b Availability 0 Authorization d Authentication 3 The quality or state of being whole complete and uncorrupted is called a Integrity b Authorization 0 Security 1 Confidentiality 4 The use of cryptographic certi cates to establish SSL connections is an example of this Accountability Authorization Identification d Authentication 5 Audit logs that track user activity on an information system provide a Identification b Authorization c Accountability 1 Authentication 6 This type of leader reserves all decisionmaking responsibilities for herhimself a Autocratic b Democratic c LaissezFaire d Diplomatic 7 Strategic Planning a Focuses on production planning b Occurs at the highest levels of an organization 0 Focuses on the daytoday operation of local resources 1 Occurs in the short or immediate term 8 Which of the following is NOT a step in the problemsolving process a Select implement and evaluate a solution 037 10 ll 12 13 14 15 b Analyze and compare possible solutions c Build support among management for the candidate solution d Gather facts and make assumptions Which of the following Principles of Information Security management seeks to dictate certain behavior within the organization through a set of organizational guidance a Planning b Policy c Programs d People Information security project managers often follow methodologies based on what methodology promoted by the Project Management Institute a Security Systems Development Life Cycle SecSDLC b Security Project and Management Methodology SPAMM c Project Management System Methodology PMSMeth d Project Management Body of Knowledge PMBoK Which of the following is NOT a project plan input a Resources b Work time c Project deliverables d All of these are inputs This is one of the most frequently cited failures in project management a Overly restrictive management b Excessive personnel on project c Failure to meet project deadlines d Loose or ambiguous project specifications If the project deliverables meets the requirements specified in the project plan the project has met this objective otherwise it has not a Cost b Resources c Quality d Time This occurs when the project manager spends more time documenting project tasks collecting performance measurements recording project task information and updating project completion forecasts than accomplishing meaningful project work a Projectitus b Low productivity c The Peter Principle d The Dilbert Principle This was originally developed in the late 1950 s to meet the need of the rapidly expanding engineering projects associated with government acquisitions such as weapons systems a b c d GANTT PERT CPM WB S 16 This diagramming technique uses simple bar charts that are simple to read and easy to present to management a b c d GANTT PERT CPM WB S 17 If you are considering using an automated project management tool which of the following do you NOT have to keep in mind a b c d All of these should be kept in mind when using an automated project management 1 C 2 B 3 A 4 D 5 C 6 A 7 B 8 C 9 B 10 D 11 D 12 C 13 C 14 A 15 B 16 A H 0 Software programs cannot replace skilled and experienced project managers Software tools can get in the way of work More complex tools make the project more efficient and effective tool ANSWERS
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'