?

A. The structure and organization of the effort to manage risks to an organization's information assets.
B. A program designed to improve the security of information assets by providing targeted information, skills, and guidance for organizational employees.
C. The expansion of the quantity or quality of project deliverables from the original project plan.
D. An entry-level InfoSec professional responsible for the routine monitoring and operation of a particular InfoSec technology.
E. In larger organizations, the person responsible for some aspect of information security; in smaller organizations, this title may be assigned to the only or senior security administrator.
F. Typically considered the top information security officer in an organization.
G. Occurs when a project manager spends more time working in the project management software than accomplishing meaningful project work.
H. A diagramming technique designed to identify the sequence of tasks that make up the shortest elapsed time needed to complete a project.
I. The technical specialists responsible for the implementation and administration of some security-related technology.
J. A way to keep InfoSec at the forefront of users' minds on a daily basis.


A. InfoSec program
B. SETA
C. scope creep
D. security watchstander
E. security manager
F. CISO
G. projectitis
H. critical path method
I. security technicians
J. security awareness program

Computer Science & Information Technology

You might also like to view...

Which now dissolved company led the smartphone industry before the advent of the iPhone?

A. Compaq B. Gateway C. Palm D. BellSouth

Computer Science & Information Technology

Since diagram 0 is a(n) _____ version of process 0, it shows considerably more detail than a context diagram.

A. contracted B. exploded C. condensed D. extrapolated

Computer Science & Information Technology

The technology behind bridging NICs is a __________, which is just software that does the same Layer 2 switching a hardware switch does, including features like VLANs.

A. hypervisor B. virtual PBX C. virtual switch D. virtual machine manager

Computer Science & Information Technology

__________ are attacks that attempt to give ordinary users root access.

A. Privilege-escalation exploits B. Directory transversals C. File system access D. Modification of system resource

Computer Science & Information Technology