Filters
Question type

Study Flashcards

The date for sending the final RFP to vendors is considered a(n) ____,because it signals that all RFP preparation work is complete.


A) intermediate step
B) resource
C) milestone
D) deliverable

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

All organizations should designate a champion from the general management community of interest to supervise the implementation of an information security project plan.

A) True
B) False

Correct Answer

verifed

verified

The project planner should describe the skill set or person,often called a(n)____________________,needed to accomplish a task.

Correct Answer

verifed

verified

Planning for the implementation phase of a security project requires the creation of a detailed project plan.

A) True
B) False

Correct Answer

verifed

verified

In general,the design phase is accomplished by changing the configuration and operation of the organization's information systems to make them more secure.

A) True
B) False

Correct Answer

verifed

verified

Medium- and large-sized organizations deal with the impact of technical change on the operation of the organization through a(n)____________________ control process.

Correct Answer

verifed

verified

Most information security projects require a trained project CEO._________________________

A) True
B) False

Correct Answer

verifed

verified

The task of creating a project plan is often assigned to either a project manager or the project leader._________________________

A) True
B) False

Correct Answer

verifed

verified

The first step in the WBS approach encompasses activities,but not deliverables.

A) True
B) False

Correct Answer

verifed

verified

What major project tasks does the WBS document?

Correct Answer

verifed

verified

Work to be accomplished (activities and ...

View Answer

The Lewin change model consists of ____.


A) unfreezing
B) moving
C) refreezing
D) All of the above

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

The bull's-eye model can be used to evaluate the sequence of steps taken to integrate parts of the information security blueprint into a project plan.

A) True
B) False

Correct Answer

verifed

verified

Unfreezing in the Lewin change model involves thawing hard-and-fast habits and established procedures.

A) True
B) False

Correct Answer

verifed

verified

An ideal organization fosters resilience to change._________________________

A) True
B) False

Correct Answer

verifed

verified

____________________ is a phenomenon in which the project manager spends more time documenting project tasks,collecting performance measurements,recording project task information,and updating project completion forecasts than in accomplishing meaningful project work.

Correct Answer

verifed

verified

JAD stands for ____________________ application development.

Correct Answer

verifed

verified

A(n)____________________ is a specific point in the project plan when a task that has a noticeable impact on the progress of the project plan is complete.

Correct Answer

verifed

verified

A direct changeover is also known as going "fast turnkey." _________________________

A) True
B) False

Correct Answer

verifed

verified

Showing 61 - 78 of 78

Related Exams

Show Answer