____ occurs when the quantity or quality of project deliverables is expanded from the original project plan
Failure to meet project deadlines
____ is one of the most frequently cited failures in project management.
___________________ security encompasses the protection of an organization's communications media, technology, and content.
The ____________________ community supports the business objectives of an organization by supplying and supporting information technology appropriate to the businesss' needs.
All workers operate at approximately the same level of efficiency
The management of human resources must address many complicating factors; which of the following is NOT among them?
Operations are discrete sequences of activities with starting points and defined completion points.
The Gantt chart lists ____ on its vertical axis and provides a simple time line on the horizontal axis.
The three behavioral types of leaders are autocratic, laissez-faire, and ____________________.
An information system possesses the characteristic of ____ when it is able to recognize individual users.
The CNSS Security model known as the McCumber cube examines the confidentiality, integrity and ____________________ of information whether in storage, processing or transmission.
____________________ are the operations conducted within InfoSec, which are specifically managed as separate entities.
The three levels of planning are strategic planning, tactical planning, and ____________________ planning.
Employees benefit from the formal training required for the method
Which of the following is NOT an advantage of the PERT method?
____ of information ensures that only those with sufficient privileges and a demonstrated need may access certain information.
An information system that is able to recognize the identity of individual users is said to provide authentication
1) Policy, 2) awareness, training and education, and 3) technology are concepts vital for the protection of information.
Popular management theory categorizes the principles of management into planning, organizing, leading and controlling
According to the C.I.A. triangle, the three desirable characteristics of information are confidentiality, integrity, and ____
Which of the following Principles of Information Security Management seeks to dictate certain behavior within the organization through a set of organizational guidance?
The two network scheduling techniques, the Critical Path Method and PERT, are similar in design.
The ____ of information refers to the ability to access information without interference or obstruction and in a useable format.
The three desirable characteristics of information on which the C.I.A. triangle is founded are confidentiality, integrity, and authorization.
The integrity of information is threatened when it is exposed to corruption, damage, or destruction.
Recognize and define the problem
Which of the following is the first step in the problem-solving process?
Build support among management for the candidate solution
Which of the following is NOT a step in the problem-solving process?
____________________ is the process of achieving objectives using a given set of resources.
The characteristic of information that enables a user to access it without interference or obstruction and in a useable format is confidentiality.
If the project deliverables meet the requirements specified in the project plan, the project has met its ____________________ objective
The CNSS security model includes detailed guidelines and policies that direct the implementation of controls.
____________________ is the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information.
When you review technological feasibility, you address the organization's financial ability to purchase the technology needed to implement a candidate solution
Another popular project management tool is the bar or McCumber chart, named for its developer, who created this method in the early 1900s.
The protection of information and the systems and hardware that use, store, and transmit that information is known as ____.
____ security addresses the ability to use the network to accomplish the organization's data communication functions.
Information security can be both a process and a project because it is in fact a continuous series of projects.
The characteristic of ____ exists when a control provides assurance that every activity undertaken can be attributed to a named person or automated process.