Skip to content
Home
Directory of Certified Individuals
Approved SPD-Sponsored Courses
Course Catalog
Basic Texas Purchaser
Certified Texas Contract Developer
Certified Texas Contract Manager
Continuing Education Webinars
Continuing Education Live Events
Ethics and Refresher Courses
New User Registration
Login
Contact Us
FAQ
Home
Directory of Certified Individuals
Approved SPD-Sponsored Courses
Course Catalog
Basic Texas Purchaser
Certified Texas Contract Developer
Certified Texas Contract Manager
Continuing Education Webinars
Continuing Education Live Events
Ethics and Refresher Courses
New User Registration
Login
Contact Us
FAQ
Information Security in IT Contracting Webinar and Quiz Quiz
Please sign up for the
course
before taking this quiz.
1.
A vulnerability assessment and pen test is required prior to deployment for any application dealing with ______.
Time sensitive information
Specific information
All apps containing information
Confidential information
2.
One of the mentioned security clauses you should include in your contract is a disaster recovery plan.
True
False
3.
Not adequately addressing information security issues in the contract may lead to ___________.
A poor working relationship with the contractor
Termination for cause
Termination for convenience
All of the above
4.
As a best practice always involve Information Security at this stage of the procurement cycle _______________.
Contract formation
Bid Evaluation
When issues arise during the contract
Solicitation drafting
5.
The speaker recommends involving agency ______ and _______ departments in cloud service and other IT contracts.
HR and Operations
Project Management and Procurement
Legal and Security
IT and Executive
Back to:
Information Security in IT Contracting Webinar and Quiz