ExamGecko
Home Home / ISC / CAP

ISC CAP Practice Test - Questions Answers, Page 21

Question list
Search
Search

List of questions

Search

Related questions











You are the project manager of the CUL project in your organization. You and the project team are assessing the risk events and creating a probability and impact matrix for the identified risks.

Which one of the following statements best describes the requirements for the data type used in qualitative risk analysis?

A.
A qualitative risk analysis requires fast and simple data to complete the analysis.
A.
A qualitative risk analysis requires fast and simple data to complete the analysis.
Answers
B.
A qualitative risk analysis requires accurate and unbiased data if it is to be credible.
B.
A qualitative risk analysis requires accurate and unbiased data if it is to be credible.
Answers
C.
A qualitative risk analysis required unbiased stakeholders with biased risk tolerances.
C.
A qualitative risk analysis required unbiased stakeholders with biased risk tolerances.
Answers
D.
A qualitative risk analysis encourages biased data to reveal risk tolerances.
D.
A qualitative risk analysis encourages biased data to reveal risk tolerances.
Answers
Suggested answer: B

You are the project manager of a large construction project. Part of the project involves the wiring of the electricity in the building your project is creating. You and the project team determine the electrical work is too dangerous to perform yourself so you hire an electrician to perform the work for the project. This is an example of what type of risk response?

A.
Transference
A.
Transference
Answers
B.
Mitigation
B.
Mitigation
Answers
C.
Avoidance
C.
Avoidance
Answers
D.
Acceptance
D.
Acceptance
Answers
Suggested answer: A

You are the project manager of the GHY project for your organization. You are about to start the qualitative risk analysis process for the project and you need to determine the roles and responsibilities for conducting risk management. Where can you find this information?

A.
Risk management plan
A.
Risk management plan
Answers
B.
Enterprise environmental factors
B.
Enterprise environmental factors
Answers
C.
Staffing management plan
C.
Staffing management plan
Answers
D.
Risk register
D.
Risk register
Answers
Suggested answer: A

The Phase 1 of DITSCAP C&A is known as Definition Phase. The goal of this phase is to define the C&A level of effort, identify the main C&A roles and responsibilities, and create an agreement on the method for implementing the security requirements. What are the process activities of this phase? Each correct answer represents a complete solution. Choose all that apply.

A.
Registration
A.
Registration
Answers
B.
Document mission need
B.
Document mission need
Answers
C.
Negotiation
C.
Negotiation
Answers
D.
Initial Certification Analysis
D.
Initial Certification Analysis
Answers
Suggested answer: A, B, C

You are the project manager of the GGH Project in your company. Your company is structured as a functional organization and you report to the functional manager that you are ready to move onto the quantitative risk analysis process. What things will you need as inputs for the quantitative risk analysis of the project in this scenario?

A.
You will need the risk register, risk management plan, permission from the functional manager, and any relevant organizational process assets.
A.
You will need the risk register, risk management plan, permission from the functional manager, and any relevant organizational process assets.
Answers
B.
You will need the risk register, risk management plan, outputs of qualitative risk analysis, and any relevant organizational process assets.
B.
You will need the risk register, risk management plan, outputs of qualitative risk analysis, and any relevant organizational process assets.
Answers
C.
You will need the risk register, risk management plan, cost management plan, schedule management plan, and any relevant organizational process assets.
C.
You will need the risk register, risk management plan, cost management plan, schedule management plan, and any relevant organizational process assets.
Answers
D.
Quantitative risk analysis does not happen through the project manager in a functional stru cture.
D.
Quantitative risk analysis does not happen through the project manager in a functional stru cture.
Answers
Suggested answer: C

Which of the following professionals plays the role of a monitor and takes part in the organization's configuration management process?

A.
Senior Agency Information Security Officer
A.
Senior Agency Information Security Officer
Answers
B.
Authorizing Official
B.
Authorizing Official
Answers
C.
Chief Information Officer
C.
Chief Information Officer
Answers
D.
Common Control Provider
D.
Common Control Provider
Answers
Suggested answer: D

In which of the following DIACAP phases is residual risk analyzed?

A.
Phase 2
A.
Phase 2
Answers
B.
Phase 4
B.
Phase 4
Answers
C.
Phase 5
C.
Phase 5
Answers
D.
Phase 3
D.
Phase 3
Answers
E.
Phase 1
E.
Phase 1
Answers
Suggested answer: B

You are responsible for network and information security at a metropolitan police station. The most important concern is that unauthorized parties are not able to access data. What is this called?

A.
Confidentiality
A.
Confidentiality
Answers
B.
Encryption
B.
Encryption
Answers
C.
Integrity
C.
Integrity
Answers
D.
Availability
D.
Availability
Answers
Suggested answer: A

Mark is the project manager of the BFL project for his organization. He and the project team are creating a probability and impact matrix using RAG rating. There is some confusion and disagreement among the project team as to how a certain risk is important and priority for attention should be managed. Where can Mark determine the priority of a risk given its probability and impact?

A.
Risk response plan
A.
Risk response plan
Answers
B.
Project sponsor
B.
Project sponsor
Answers
C.
Risk management plan
C.
Risk management plan
Answers
D.
Look-up table
D.
Look-up table
Answers
Suggested answer: D

Which of the following statements are true about security risks?

Each correct answer represents a complete solution. Choose three.

A.
They can be removed completely by taking proper actions.
A.
They can be removed completely by taking proper actions.
Answers
B.
They can be analyzed and measured by the risk analysis process.
B.
They can be analyzed and measured by the risk analysis process.
Answers
C.
They can be mitigated by reviewing and taking responsible actions based on possible risks.
C.
They can be mitigated by reviewing and taking responsible actions based on possible risks.
Answers
D.
They are considered an indicator of threats coupled with vulnerability.
D.
They are considered an indicator of threats coupled with vulnerability.
Answers
Suggested answer: B, C, D
Total 395 questions
Go to page: of 40