If you want to ensure that individuals can effectively perform work processes, which activity would you implement to achieve that goal?
A. Measurement
B. Team Building
C. Performance Reviews
D. Career Development
E. Training
Effort required to couple one system with another is called:
A. Maintainability
B. Flexibility
C. Usability
D. Interoperability
The stakeholders of security system should be trained on security data collection methods and:
A. Organization mission
B. Security baseline program and charter
C. Requirements
What does 'C' stand for in PDCA cycle?
A. Correct
B. Check
C. Confirm
D. Continuous
Which of the following factors should NOT be considered when defining a Control Method?
A. Risk Severity
B. Cost, Effort, and Cycle Time Impact
C. Strength of the Control Method
D. Unavailability of Appropriate Resources and People
Three fundamental types of mistakes that IT leaders make are:
A. Isolation, lack of modeling, lack of business perspective
B. Isolation, inability to reward, lack of dedication
C. Isolation, inability to reward, lack of business perspective
D. None of the above
There is a strong correlation between process maturity and defect rates. As the process maturity level increases, the defect rate decreases.
A. True
B. False
The risk associated with replacing a team member would be characterized as:
A. Time-Based
B. Situational
C. Interdependent
D. Time-Based
E. Value-Based
-- Exhibit
-- Exhibit -The diagram is an example of a(n):
A. Process Map Diagram
B. Affinity Diagram
C. Force Field Diagram
D. Flowchart
E. Cause-and-Effect Diagram