Chapter 10

Chapter 10 - 10 True/False Indicate whether the statement...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
10 True/False Indicate whether the statement is true or false. ____ 1. Weak management support, with overdelegated responsibility and no champion, sentences the project to al- most-certain failure. ____ 2. Unfreezing in the Lewin change model involves thawing out hard-and-fast habits and established procedures. ____ 3. Every organization needs to develop an information security department or program of its own. ____ 4. The bull’s-eye model can be used to evaluate the sequence of steps taken to integrate parts of the information security blueprint into a project plan. ____ 5. DMZ is the primary way to secure an organization’s networks. ____ 6. The networks layer of the bull’s-eye model needs attention first. ____ 7. The primary drawback to the direct changeover approach is that if the new system fails or needs modification, users may be without services while the system’s bugs are worked out. ____ 8. When an estimate is flawed, as when the number of effort-hours required is underestimated, the plan should be corrected and downstream tasks updated to reflect the change. ____ 9. All organizations should designate a champion from the general management community of interest to super- vise the implementation of an information security project plan. ____ 10. The size of the organization and the normal conduct of business may preclude a single large training program on new security procedures or technologies. ____ 11. The goal of the project plan is to add new security components that negatively impact the day-to-day opera- tions of individual employees. ____ 12. The lack of enough qualified, trained, and available personnel constrains the project plan. ____ 13. Each organization determines its capital budget and the rules for managing capital spending and expenses the same way. ____ 14. The budgets of public organizations are usually based on the results of legislation or public meetings. ____ 15. Planners need to estimate the effort required to complete each task, subtask, or action step. ____ 16. The first step in the WBS approach encompasses activities, but not deliverables. ____ 17. To prepare the WBS, you need an ERP package. ____ 18. Each organization has to determine its own project management methodology for IT and information security projects. ____ 19. The project plan must describe how to acquire and implement the needed security controls and create a setting in which those controls achieve the desired outcomes. ____ 20. In general, the design phase is accomplished by changing the configuration and operation of the organiza- tion’s information systems to make them more secure. Modified True/False Indicate whether the statement is true or false. If false, change the identified word or phrase to make the
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
statement true. ____ 21.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/09/2011 for the course COM 308 taught by Professor E.bautista during the Fall '10 term at St. Leo.

Page1 / 9

Chapter 10 - 10 True/False Indicate whether the statement...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online