ExamGecko
Home Home / ISC / CAP

ISC CAP Practice Test - Questions Answers, Page 19

Question list
Search
Search

List of questions

Search

Related questions











Which of the following acts is used to recognize the importance of information security to the economic and national security interests of the United States?

A.
Computer Fraud and Abuse Act
A.
Computer Fraud and Abuse Act
Answers
B.
FISMA
B.
FISMA
Answers
C.
Lanham Act
C.
Lanham Act
Answers
D.
Computer Misuse Act
D.
Computer Misuse Act
Answers
Suggested answer: B

What approach can a project manager use to improve the project's performance during qualitative risk analysis?

A.
Create a risk breakdown structure and delegate the risk analysis to the appropriate project team members.
A.
Create a risk breakdown structure and delegate the risk analysis to the appropriate project team members.
Answers
B.
Focus on high-priority risks.
B.
Focus on high-priority risks.
Answers
C.
Focus on near-term risks first.
C.
Focus on near-term risks first.
Answers
D.
Analyze as many risks as possible regardless of who initiated the risk event.
D.
Analyze as many risks as possible regardless of who initiated the risk event.
Answers
Suggested answer: B

Which of the following is used in the practice of Information Assurance (IA) to define assurance requirements?

A.
Classic information security model
A.
Classic information security model
Answers
B.
Communications Management Plan
B.
Communications Management Plan
Answers
C.
Five Pillars model
C.
Five Pillars model
Answers
D.
Parkerian Hexad
D.
Parkerian Hexad
Answers
Suggested answer: A

Joan is the project manager of the BTT project for her company. She has worked with her project to create risk responses for both positive and negative risk events within the project. As a result of this process Joan needs to update the project document updates. She has updated the assumptions log as a result of the findings and risk responses, but what other documentation will need to be updated as an output of risk response planning?

A.
Lessons learned
A.
Lessons learned
Answers
B.
Scope statement
B.
Scope statement
Answers
C.
Risk Breakdown Structure
C.
Risk Breakdown Structure
Answers
D.
Technical documentation
D.
Technical documentation
Answers
Suggested answer: D

Which of the following access control models uses a predefined set of access privileges for an object of a system?

A.
Discretionary Access Control
A.
Discretionary Access Control
Answers
B.
Mandatory Access Control
B.
Mandatory Access Control
Answers
C.
Policy Access Control
C.
Policy Access Control
Answers
D.
Role-Based Access Control
D.
Role-Based Access Control
Answers
Suggested answer: B

Which of the following describes residual risk as the risk remaining after risk mitigation has occurred?

A.
DIACAP
A.
DIACAP
Answers
B.
ISSO
B.
ISSO
Answers
C.
SSAA
C.
SSAA
Answers
D.
DAA
D.
DAA
Answers
Suggested answer: A

You work as the project manager for Bluewell Inc. There has been a delay in your project work that is adversely affecting the project schedule. You decide, with your stakeholders' approval, to fast track the project work to get the project done faster. When you fast track the project, what is likely to increase?

A.
Human resource needs
A.
Human resource needs
Answers
B.
Risks
B.
Risks
Answers
C.
Costs
C.
Costs
Answers
D.
Quality control concerns
D.
Quality control concerns
Answers
Suggested answer: B

Which of the following components ensures that risks are examined for all new proposed change requests in the change control system?

A.
Risk monitoring and control
A.
Risk monitoring and control
Answers
B.
Scope change control
B.
Scope change control
Answers
C.
Configuration management
C.
Configuration management
Answers
D.
Integrated change control
D.
Integrated change control
Answers
Suggested answer: D

Which of the following classification levels defines the information that, if disclosed to the unauthorized parties, could be reasonably expected to cause exceptionally grave damage to the national security?

A.
Secret information
A.
Secret information
Answers
B.
Top Secret information
B.
Top Secret information
Answers
C.
Confidential information
C.
Confidential information
Answers
D.
Unclassified information
D.
Unclassified information
Answers
Suggested answer: B

Mary is the project manager of the HGH Project for her company. She and her project team have agreed that if the vendor is late by more than ten days they will cancel the order and hire the NBG Company to fulfill the order. The NBG Company can guarantee orders within three days, but the costs of their products are significantly more expensive than the current vendor. What type of a response strategy is this?

A.
Contingent response strategy
A.
Contingent response strategy
Answers
B.
Expert judgment
B.
Expert judgment
Answers
C.
Internal risk management strategy
C.
Internal risk management strategy
Answers
D.
External risk response
D.
External risk response
Answers
Suggested answer: A
Total 395 questions
Go to page: of 40