Question 1
Question 1
Saved
The most common credential for a CISO-level position is the Security+ certification. _____
Question 1 options:
True
False
Question 2 (1 point)
Saved
The _____ is the title most commonly associated with the top information security officer in the
organization.
Question 2 options:
CISO
CFO
CTO
CEO
Question 3 (1 point)
Saved
The (ISC)2 CISSP-ISSEP concentrationfocuses on the knowledge area including systems lifecycle
management, threat intelligence and incident managements.
Question 3 options:
True
False
Question 4 (1 point)
Saved
A background check must always be conducted to determine the level of trust the business can place
in a candidate for an information security position.
Question 4 options:
True
False
Question 5 (1 point)
Saved
_____ are hired by the organization to serve in a temporary position or to supplement the existing
workforce.
Question 5 options:
Temporary employees
Consultants
Contractors
Self-employees
Question 6 (1 point)
Saved
Like the CISSP, the SSCP certification is more applicable to the security_____ than to the security
_____.
Question 6 options:
technician, manager
manager, engineer
manager, technician
technician, executive
Question 7 (1 point)
Saved
The model commonly used by large organizations places the information security department within
the _____ department.
Question 7 options:
management
information technology
physical security
production
Question 8 (1 point)
Saved
In project planning, the tasks or action steps that come before the specific task at hand are
commonly referred to as milestones. _____
Question 8 options:
True
False
Question 9 (1 point)
Saved
The parallel operations strategy works well when an isolated group can serve as a test area, which
prevents any problems with the new system dramatically interfering with the performance of the
organization as a whole. _____
Question 9 options:
True
False
Question 10 (1 point)
Saved
Question 10 options:
True
False
Question 11 (1 point)
Saved
Some cases of _____ are simple, such as requiring employees to begin using a new password on an
announced date.
Question 11 options:
phased implementation
direct changeover
pilot implementation
wrap-up
Question 12 (1 point)
Saved
The SSCP examination is much more rigorous than the CISSP examination.
Question 12 options:
True
False
Question 13 (1 point)
Saved
Question 13 options:
True
False
Question 14 (1 point)
Saved
Existing information security-related certifications are typically well understood by those responsible
for hiring in organizations.
Question 14 options:
True
False
Question 15 (1 point)
Saved
Many who enter the field of information security are technical professionals such as _____ who find
themselves working on information security applications and processes more often than traditional
IT assignments.
Question 15 options:
database administrators
programmers
Question 16 (1 point)
Saved
A methodology and formal development strategy for the design and implementation of an
information system is referred to as a _____.
Question 16 options:
systems design
systems schema
Question 17 (1 point)
Saved
The implementation phase is the longest and most expensive phase of the systems development life
cycle (SDLC).
Question 17 options:
True
False
Question 18 (1 point)
Saved
_____ is a cornerstone in the protection of information assets and in the prevention of financial loss.
Question 18 options:
Fire suppression
Business separation
Separation of duties
Collusion
Question 19 (1 point)
Saved
Question 19 options:
True
False
Question 20 (1 point)
Saved
The size of the organization and the normal conduct of business may preclude a large training
program on new security procedures or technologies.
Question 20 options:
True
False
Question 21 (1 point)
Saved
A(n) _____ determines the impact that a specific technology or approach can have on the
organization’s information assets and what it may cost.
Question 21 options:
RFP
WBS
SDLC
CBA
Question 22 (1 point)
Saved
ISACA promotes the CISA certification as being appropriate for accounting, networking, and security
professionals. _____
Question 22 options:
True
False
Question 23 (1 point)
Saved
The first step in the work breakdown structure (WBS) is to break down the project plan into its action
steps.
Question 23 options:
True
False
Question 24 (1 point)
Saved
The investigation phase of the SDLC involves specification of the objectives, constraints, and scope of
the project.
Question 24 options:
True
False
Question 25 (1 point)
Saved
Weak management support, with overly delegated responsibility and no champion, sentences a
project to almost-certain failure.
Question 25 options:
True
False
Question 26 (1 point)
Saved
In most cases, organizations look for a technically qualified information security _____ who has a
solid understanding of how an organization operates.
Question 26 options:
generalist
specialist
internist
expert
Question 27 (1 point)
Saved
"Administrators" provide the policies, guidelines, and standards in the Schwartz classification. _____
Question 27 options:
True
False
Question 28 (1 point)
Saved
To maintain a secure facility, all contract employees should be escorted from room to room, as well
as into and out of the facility.
Question 28 options:
True
False
Question 29 (1 point)
Saved
Question 29 options:
True
False
Question 30 (1 point)
Saved
By managing the _____, the organization can reduce unintended consequences by having a process
to resolve the potential conflict and disruption that uncoordinated change can introduce.
Question 30 options:
conversion process
wrap-up
process of change
governance
Question 31 (1 point)
Saved
Planning for the implementation phase requires the creation of a detailed request for proposal,
which is often assigned either to a project manager or the project champion. _____
Question 31 options:
True
False
Question 32 (1 point)
Saved
An ideal organization fosters resilience to change, meaning the the organization understands that
change is a necessary part of the culture and that embracing change is more productive than fighting
it.. _____
Question 32 options:
True
False
Question 33 (1 point)
Saved
Organizations are moving toward more _____-focused development approaches, seeking to improve
not only the functionality of the systems they have in place, but consumer confidence in their
product.
Question 33 options:
security
reliability
accessibility
availability
Question 34 (1 point)
Saved
Each organization has to determine its own project management methodology for IT and information
security projects.
Question 34 options:
True
False
Question 35 (1 point)
Saved
In some organizations, the CISO’s position may be combined with physical security responsibilities or
may even
report to a security manager who is responsible for both logical (information) security and physical
security and such a
position is generally referred to as a _____.
Question 35 options:
CSO
CPSO
CTO
CNSO
Question 36 (1 point)
Saved
The goal of the _____ is to resolve any pending project-related issues, critique the overall effort of
the project, and draw conclusions about how to improve the project management process for the
future.
Question 36 options:
direct changeover
project wrap-up
phased implementation
pilot implementation
Question 37 (1 point)
Saved
A proven method for prioritizing a program of complex change is the bull’s-eye method. _____
Question 37 options:
True
False
Question 38 (1 point)
Saved
The ISSEP concentration allows CISSP certificate holders to demonstrate expert knowledge of all of
the following except _____.
Question 38 options:
systems security engineering
technical management
international laws
Question 39 (1 point)
Saved
Question 39 options:
True
False
Question 40 (1 point)
Saved
Performance management is the process of identifying and controlling the resources applied to a
project as well as measuring progress and adjusting the process as progress is made toward the goal.
_____
Question 40 options:
True
False