ExamGecko
Home Home / ISC / CAP

ISC CAP Practice Test - Questions Answers, Page 17

Question list
Search
Search

Related questions











Which of the following formulas was developed by FIPS 199 for categorization of an information type?

A.
SC information type = {(confidentiality, controls), (integrity, controls), (authentication, controls)}
A.
SC information type = {(confidentiality, controls), (integrity, controls), (authentication, controls)}
Answers
B.
SC information type = {(confidentiality, impact), (integrity, impact), (availability, impact)}
B.
SC information type = {(confidentiality, impact), (integrity, impact), (availability, impact)}
Answers
C.
SC information type = {(confidentiality, risk), (integrity, risk), (availability, risk)}
C.
SC information type = {(confidentiality, risk), (integrity, risk), (availability, risk)}
Answers
D.
SC information type = {(Authentication, impact), (integrity, impact), (availability, impact)}
D.
SC information type = {(Authentication, impact), (integrity, impact), (availability, impact)}
Answers
Suggested answer: B

Which of the following is NOT considered an environmental threat source?

A.
Pollution
A.
Pollution
Answers
B.
Hurricane
B.
Hurricane
Answers
C.
Chemical
C.
Chemical
Answers
D.
Water
D.
Water
Answers
Suggested answer: B

Which of the following is NOT a type of penetration test?

A.
Cursory test
A.
Cursory test
Answers
B.
Partial-knowledge test
B.
Partial-knowledge test
Answers
C.
Zero-knowledge test
C.
Zero-knowledge test
Answers
D.
Full knowledge test
D.
Full knowledge test
Answers
Suggested answer: A

Which of the following formulas was developed by FIPS 199 for categorization of an information system?

A.
SC information system = {(confidentiality, impact), (integrity, controls), (availability, risk)}
A.
SC information system = {(confidentiality, impact), (integrity, controls), (availability, risk)}
Answers
B.
SC information system = {(confidentiality, impact), (integrity, impact), (availability, impact)}
B.
SC information system = {(confidentiality, impact), (integrity, impact), (availability, impact)}
Answers
C.
SC information system = {(confidentiality, controls), (integrity, controls), (availability, controls )}
C.
SC information system = {(confidentiality, controls), (integrity, controls), (availability, controls )}
Answers
D.
SC information system = {(confidentiality, risk), (integrity, impact), (availability, controls)}
D.
SC information system = {(confidentiality, risk), (integrity, impact), (availability, controls)}
Answers
Suggested answer: B

Which of the following NIST documents defines impact?

A.
NIST SP 800-53
A.
NIST SP 800-53
Answers
B.
NIST SP 800-26
B.
NIST SP 800-26
Answers
C.
NIST SP 800-30
C.
NIST SP 800-30
Answers
D.
NIST SP 800-53A
D.
NIST SP 800-53A
Answers
Suggested answer: C

Which of the following relations correctly describes residual risk?

A.
Residual Risk = Threats x Vulnerability x Asset Gap x Control Gap
A.
Residual Risk = Threats x Vulnerability x Asset Gap x Control Gap
Answers
B.
Residual Risk = Threats x Exploit x Asset Value x Control Gap
B.
Residual Risk = Threats x Exploit x Asset Value x Control Gap
Answers
C.
Residual Risk = Threats x Exploit x Asset Value x Control Gap
C.
Residual Risk = Threats x Exploit x Asset Value x Control Gap
Answers
D.
Residual Risk = Threats x Vulnerability x Asset Value x Control Gap
D.
Residual Risk = Threats x Vulnerability x Asset Value x Control Gap
Answers
Suggested answer: D

Which of the following is NOT a phase of the security certification and accreditation process?

A.
Initiation
A.
Initiation
Answers
B.
Security certification
B.
Security certification
Answers
C.
Operation
C.
Operation
Answers
D.
Maintenance
D.
Maintenance
Answers
Suggested answer: C

Which of the following processes has the goal to ensure that any change does not lead to reduced or compromised security?

A.
Change control management
A.
Change control management
Answers
B.
Security management
B.
Security management
Answers
C.
Configuration management
C.
Configuration management
Answers
D.
Risk management
D.
Risk management
Answers
Suggested answer: A

Which of the following is not a part of Identify Risks process?

A.
System or process flow chart
A.
System or process flow chart
Answers
B.
Influence diagram
B.
Influence diagram
Answers
C.
Decision tree diagram
C.
Decision tree diagram
Answers
D.
Cause and effect diagram
D.
Cause and effect diagram
Answers
Suggested answer: C

In which of the following phases does the SSAA maintenance take place?

A.
Phase 3
A.
Phase 3
Answers
B.
Phase 2
B.
Phase 2
Answers
C.
Phase 1
C.
Phase 1
Answers
D.
Phase 4
D.
Phase 4
Answers
Suggested answer: D
Total 395 questions
Go to page: of 40