ExamGecko
Home Home / ISC / CAP

ISC CAP Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

Related questions











Your project uses a piece of equipment that if the temperature of the machine goes above 450 degree Fahrenheit the machine will overheat and have to be shut down for 48 hours. Should this machine overheat even once it will delay the project's end date. You work with your project to create a response that should the temperature of the machine reach 430, the machine will be paused for at least an hour to cool it down. The temperature of 430 is called what?

A.
Risk identification
A.
Risk identification
Answers
B.
Risk response
B.
Risk response
Answers
C.
Risk trigger
C.
Risk trigger
Answers
D.
Risk event
D.
Risk event
Answers
Suggested answer: C

According to U.S. Department of Defense (DoD) Instruction 8500.2, there are eight Information Assurance (IA) areas, and the controls are referred to as IA controls. Which of the following are among the eight areas of IA defined by DoD? Each correct answer represents a complete solution. Choose all that apply.

A.
DC Security Design & Configuration
A.
DC Security Design & Configuration
Answers
B.
VI Vulnerability and Incident Management
B.
VI Vulnerability and Incident Management
Answers
C.
EC Enclave and Computing Environment
C.
EC Enclave and Computing Environment
Answers
D.
Information systems acquisition, development, and maintenance
D.
Information systems acquisition, development, and maintenance
Answers
Suggested answer: A, B, C

Which of the following is an Information Assurance (IA) model that protects and defends information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation?

A.
Parkerian Hexad
A.
Parkerian Hexad
Answers
B.
Capability Maturity Model (CMM)
B.
Capability Maturity Model (CMM)
Answers
C.
Classic information security model
C.
Classic information security model
Answers
D.
Five Pillars model
D.
Five Pillars model
Answers
Suggested answer: D

You work as a project manager for BlueWell Inc. Your project is running late and you must respond to the risk. Which risk response can you choose that will also cause you to update the human resource management plan?

A.
Teaming agreements
A.
Teaming agreements
Answers
B.
Crashing the project
B.
Crashing the project
Answers
C.
Transference
C.
Transference
Answers
D.
Fast tracking the project
D.
Fast tracking the project
Answers
Suggested answer: B

FITSAF stands for Federal Information Technology Security Assessment Framework. It is a methodology for assessing the security of information systems.

Which of the following FITSAF levels shows that the procedures and controls have been implemented?

A.
Level 2
A.
Level 2
Answers
B.
Level 3
B.
Level 3
Answers
C.
Level 5
C.
Level 5
Answers
D.
Level 4
D.
Level 4
Answers
E.
Level 1
E.
Level 1
Answers
Suggested answer: B

You are the project manager for your company and a new change request has been approved for your project. This change request, however, has introduced several new risks to the project. You have communicated these risk events and the project stakeholders understand the possible effects these risks could have on your project. You elect to create a mitigation response for the identified risk events. Where will you record the mitigation response?

A.
Risk register
A.
Risk register
Answers
B.
Risk log
B.
Risk log
Answers
C.
Risk management plan
C.
Risk management plan
Answers
D.
Project management plan
D.
Project management plan
Answers
Suggested answer: A

Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

A.
Continuity of Operations Plan
A.
Continuity of Operations Plan
Answers
B.
Disaster recovery plan
B.
Disaster recovery plan
Answers
C.
Contingency plan
C.
Contingency plan
Answers
D.
Business continuity plan
D.
Business continuity plan
Answers
Suggested answer: C

The Phase 2 of DITSCAP C&A is known as Verification. The goal of this phase is to obtain a fully integrated system for certification testing and accreditation.

What are the process activities of this phase?

Each correct answer represents a complete solution. Choose all that apply.

A.
System development
A.
System development
Answers
B.
Certification analysis
B.
Certification analysis
Answers
C.
Registration
C.
Registration
Answers
D.
Assessment of the Analysis Results
D.
Assessment of the Analysis Results
Answers
E.
Configuring refinement of the SSAA
E.
Configuring refinement of the SSAA
Answers
Suggested answer: A, B, D, E

ISO 17799 has two parts. The first part is an implementation guide with guidelines on how to build a comprehensive information security infrastructure and the second part is an auditing guide based on requirements that must be met for an organization to be deemed compliant with ISO 17799. What are the ISO 17799 domains?

Each correct answer represents a complete solution. Choose all that apply.

A.
Information security policy for the organization
A.
Information security policy for the organization
Answers
B.
Personnel security
B.
Personnel security
Answers
C.
Business continuity management
C.
Business continuity management
Answers
D.
System architecture management
D.
System architecture management
Answers
E.
System development and maintenance
E.
System development and maintenance
Answers
Suggested answer: A, B, C, E

Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation. Which of the following statements are true about Certification and Accreditation?

Each correct answer represents a complete solution. Choose two.

A.
Certification is a comprehensive assessment of the management, operational, and technical security controls in an information system.
A.
Certification is a comprehensive assessment of the management, operational, and technical security controls in an information system.
Answers
B.
Accreditation is a comprehensive assessment of the management, operational, and technical security controls in an information system.
B.
Accreditation is a comprehensive assessment of the management, operational, and technical security controls in an information system.
Answers
C.
Certification is the official management decision given by a senior agency official to authorize operation of an information system.
C.
Certification is the official management decision given by a senior agency official to authorize operation of an information system.
Answers
D.
Accreditation is the official management decision given by a senior agency official to authorize operation of an information system.
D.
Accreditation is the official management decision given by a senior agency official to authorize operation of an information system.
Answers
Suggested answer: A, D
Total 395 questions
Go to page: of 40