ollu-iasm-8303-ol01-chapter-1-quiz

Share on facebook
Facebook
Share on google
Google+
Share on twitter
Twitter
Share on linkedin
LinkedIn

• Question 1

5
out of 5 points

A project can have more than one
critical path.

• Question 2

5
out of 5 points

What do audit logs that track user
activity on an information system provide?

• Question 3

5
out of 5 points

It is possible to take a very
complex operation and diagram it in PERT if you can answer three key questions
about each activity. Which of the following is NOT one of them?

• Question 4

5
out of 5 points

Which of the following is NOT a
unique function of Information Security Management?

• Question 5

5
out of 5 points

According to the C.I.A. triangle,
which of the following is a desirable characteristic for computer security?

• Question 6

5
out of 5 points

The use of cryptographic
certificates to establish Secure Sockets Layer (SSL) connections is an example
of which process?

• Question 7

5
out of 5 points

Communications security involves the
protection of which of the following?.

• Question 8

5
out of 5 points

Which of the following is NOT a step
in the problem-solving process?

• Question 9

5
out of 5 points

Which of the following was
originally developed in the late 1950s to meet the need of the rapidly
expanding engineering projects associated with government acquisitions such as
weapons systems?

• Question 10

5
out of 5 points

The management of human resources
must address many complicating factors; which of the following is NOT among
them?

• Question 11

5
out of 5 points

Project scope management ensures
that the project plan includes only those activities that are necessary to
complete it.

• Question 12

5
out of 5 points

Which of the following is the first
step in the problem-solving process?

• Question 13

0
out of 5 points

Which of the following is NOT a
knowledge area in the Project Management knowledge body?

• Question 14

5
out of 5 points

Corruption of information can occur
only while information is being stored.

• Question 15

5
out of 5 points

Which function of InfoSec Management
encompasses security personnel as well as aspects of the SETA program?

• Question 16

5
out of 5 points

Information security project
managers often follow methodologies based on what methodology promoted by the
Project Management Institute?

• Question 17

5
out of 5 points

What is one of the most frequently
cited failures in project management?

• Question 18

5
out of 5 points

The first step in solving problems
is to gather facts and make assumptions.

In the WBS approach, the project
plan is first broken down into tasks placed on the WBS task list. The minimum
attributes that should be identified for each task include all but which of the
following?

a.

The
common or specialized skills needed to perform the task

c.

The
number of people and other resources needed for each task

• Question 20

5
out of 5 points

Which of the following functions of
Information Security Management seeks to dictate certain behavior within the
organization through a set of organizational guidelines?

:
c.

policy

: c.

policy

More to explorer

Change Management Presentation

Purpose of AssessmentDevelop specific strategies with supporting tactics to implement positive change within an organization. You may refer to the information that you

Driver Safety

 You were recently hired as the fleet safety manager of a company that operates a fleet of 25 delivery trucks within a

Answer:

Title: ollu-iasm-8303-ol01-chapter-1-quiz

This question has been Solved!

Click the button below to order this solution.

Leave a Reply

Your email address will not be published. Required fields are marked *

Open chat