ExamGecko
Home Home / ISC / CAP

ISC CAP Practice Test - Questions Answers, Page 18

Question list
Search
Search

List of questions

Search

Related questions











In which of the following phases do the system security plan update and the Plan of Action and Milestones (POAM) update take place?

A.
Continuous Monitoring Phase
A.
Continuous Monitoring Phase
Answers
B.
Accreditation Phase
B.
Accreditation Phase
Answers
C.
Preparation Phase
C.
Preparation Phase
Answers
D.
DITSCAP Phase
D.
DITSCAP Phase
Answers
Suggested answer: A

Which of the following processes is used to protect the data based on its secrecy, sensitivity, or confidentiality?

A.
Change Control
A.
Change Control
Answers
B.
Data Hiding
B.
Data Hiding
Answers
C.
Configuration Management
C.
Configuration Management
Answers
D.
Data Classification
D.
Data Classification
Answers
Suggested answer: D

Which of the following assessment methods is used to review, inspect, and analyze assessment objects?

A.
Testing
A.
Testing
Answers
B.
Examination
B.
Examination
Answers
C.
Interview
C.
Interview
Answers
D.
Debugging
D.
Debugging
Answers
Suggested answer: B

Which of the following documents is used to provide a standard approach to the assessment of NIST SP 800-53 security controls?

A.
NIST SP 800-37
A.
NIST SP 800-37
Answers
B.
NIST SP 800-41
B.
NIST SP 800-41
Answers
C.
NIST SP 800-53A
C.
NIST SP 800-53A
Answers
D.
NIST SP 800-66
D.
NIST SP 800-66
Answers
Suggested answer: C

What is the objective of the Security Accreditation Decision task?

A.
To determine whether the agency-level risk is acceptable or not.
A.
To determine whether the agency-level risk is acceptable or not.
Answers
B.
To make an accreditation decision
B.
To make an accreditation decision
Answers
C.
To accredit the information system
C.
To accredit the information system
Answers
D.
To approve revisions of NIACAP
D.
To approve revisions of NIACAP
Answers
Suggested answer: A

You are the project manager for your organization. You are working with your key stakeholders in the qualitative risk analysis process. You understand that there is certain bias towards the risk events in the project that you need to address, manage, and ideally reduce. What solution does the PMBOK recommend to reduce the influence of bias during qualitative risk analysis?

A.
Establish the definitions of the levels of probability and impact
A.
Establish the definitions of the levels of probability and impact
Answers
B.
Isolate the stakeholders by project phases to determine their risk bias
B.
Isolate the stakeholders by project phases to determine their risk bias
Answers
C.
Involve all stakeholders to vote on the probability and impact of the risk events
C.
Involve all stakeholders to vote on the probability and impact of the risk events
Answers
D.
Provide iterations of risk analysis for true reflection of a risk probability and impact
D.
Provide iterations of risk analysis for true reflection of a risk probability and impact
Answers
Suggested answer: A

Numerous information security standards promote good security practices and define frameworks or systems to structure the analysis and design for managing information security controls. Which of the following are the international information security standards? Each correct answer represents a complete solution.

Choose all that apply.

A.
Human resources security
A.
Human resources security
Answers
B.
Organization of information security
B.
Organization of information security
Answers
C.
Risk assessment and treatment
C.
Risk assessment and treatment
Answers
D.
AU audit and accountability
D.
AU audit and accountability
Answers
Suggested answer: A, B, C

Beth is the project manager of the BFG Project for her company. In this project Beth has decided to create a contingency response based on the performance of the project schedule. If the project schedule variance is greater than $10,000 the contingency plan will be implemented. What is the formula for the schedule variance?

A.
SV=EV-PV
A.
SV=EV-PV
Answers
B.
SV=EV/AC
B.
SV=EV/AC
Answers
C.
SV=PV-EV
C.
SV=PV-EV
Answers
D.
SV=EV/PV
D.
SV=EV/PV
Answers
Suggested answer: A

You are the project manager of the HJK Project for your organization. You and the project team have created risk responses for many of the risk events in the project. Where should you document the proposed responses and the current status of all identified risks?

A.
Risk management plan
A.
Risk management plan
Answers
B.
Stakeholder management strategy
B.
Stakeholder management strategy
Answers
C.
Risk register
C.
Risk register
Answers
D.
Lessons learned documentation
D.
Lessons learned documentation
Answers
Suggested answer: C

Ned is the program manager for his organization and he's considering some new materials for his program. He and his team have never worked with these materials before and he wants to ask the vendor for some additional information, a demon, and even some samples. What type of a document should Ned send to the vendor?

A.
IFB
A.
IFB
Answers
B.
RFI
B.
RFI
Answers
C.
RFQ
C.
RFQ
Answers
D.
RFP
D.
RFP
Answers
Suggested answer: B
Total 395 questions
Go to page: of 40