ExamGecko
Home / ISC / CAP / List of questions
Ask Question

ISC CAP Practice Test - Questions Answers, Page 23

List of questions

Question 221

Report Export Collapse

Which of the following are the types of access controls?

Each correct answer represents a complete solution. Choose three.

Administrative
Administrative
Automatic
Automatic
Technical
Technical
Physical
Physical
Suggested answer: A, C, D
asked 18/09/2024
Mina Shaker
53 questions

Question 222

Report Export Collapse

You are the project manager of the NNQ Project for your company and are working you're your project team to define contingency plans for the risks within your project. Mary, one of your project team members, asks what a contingency plan is. Which of the following statements best defines what a contingency response is?

Some responses are designed for use only if certain events occur.
Some responses are designed for use only if certain events occur.
Some responses have a cost and a time factor to consider for each risk event.
Some responses have a cost and a time factor to consider for each risk event.
Some responses must counteract pending risk events.
Some responses must counteract pending risk events.
Quantified risks should always have contingency responses.
Quantified risks should always have contingency responses.
Suggested answer: A
asked 18/09/2024
Peter Shillingford
36 questions

Question 223

Report Export Collapse

Who is responsible for the stakeholder expectations management in a high-profile, high-risk project?

Project management office
Project management office
Project sponsor
Project sponsor
Project risk assessment officer
Project risk assessment officer
Project manager
Project manager
Suggested answer: D
asked 18/09/2024
Arun Samuel
50 questions

Question 224

Report Export Collapse

Which of the following requires all general support systems and major applications to be fully certified and accredited before these systems and applications are put into production?

Each correct answer represents a part of the solution. Choose all that apply.

NIST
NIST
FIPS
FIPS
Office of Management and Budget (OMB)
Office of Management and Budget (OMB)
FISMA
FISMA
Suggested answer: C, D
asked 18/09/2024
Tiago Carvalho
49 questions

Question 225

Report Export Collapse

Which of the following refers to a process that is used for implementing information security?

Certification and Accreditation (C&A)
Certification and Accreditation (C&A)
Information Assurance (IA)
Information Assurance (IA)
Five Pillars model
Five Pillars model
Classic information security model
Classic information security model
Suggested answer: A
asked 18/09/2024
Daria Frutskaya
43 questions

Question 226

Report Export Collapse

What project management plan is most likely to direct the quantitative risk analysis process for a project in a matrix environment?

Staffing management plan
Staffing management plan
Risk analysis plan
Risk analysis plan
Human resource management plan
Human resource management plan
Risk management plan
Risk management plan
Suggested answer: D
asked 18/09/2024
Vijay Kumar
50 questions

Question 227

Report Export Collapse

Your project team has identified a project risk that must be responded to. The risk has been recorded in the risk register and the project team has been discussing potential risk responses for the risk event. The event is not likely to happen for several months but the probability of the event is high. Which one of the following is a valid response to the identified risk event?

Corrective action
Corrective action
Technical performance measurement
Technical performance measurement
Risk audit
Risk audit
Earned value management
Earned value management
Suggested answer: A
asked 18/09/2024
Kevin Brigitta
33 questions

Question 228

Report Export Collapse

Which of the following documents is described in the statement below?

"It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning."

Project charter
Project charter
Risk management plan
Risk management plan
Risk register
Risk register
Quality management plan
Quality management plan
Suggested answer: C
asked 18/09/2024
Meena Utsaha
34 questions

Question 229

Report Export Collapse

Joan is a project management consultant and she has been hired by a firm to help them identify risk events within the project. Joan would first like to examine the project documents including the plans, assumptions lists, project files, and contracts. What key thing will help Joan to discover risks within the review of the project documents?

The project documents will help the project manager, or Joan, to identify what risk identification approach is best to pursue.
The project documents will help the project manager, or Joan, to identify what risk identification approach is best to pursue.
Plans that have loose definitions of terms and disconnected approaches will reveal risks.
Plans that have loose definitions of terms and disconnected approaches will reveal risks.
Poorly written requirements will reveal inconsistencies in the project plans and documents.
Poorly written requirements will reveal inconsistencies in the project plans and documents.
Lack of consistency between the plans and the project requirements and assumptions can be the indicators of risk in the project.
Lack of consistency between the plans and the project requirements and assumptions can be the indicators of risk in the project.
Suggested answer: D
asked 18/09/2024
Ramon Lim
40 questions

Question 230

Report Export Collapse

Which of the following statements about the availability concept of Information security management is true?

It ensures that modifications are not made to data by unauthorized personnel or processes .
It ensures that modifications are not made to data by unauthorized personnel or processes .
It ensures reliable and timely access to resources.
It ensures reliable and timely access to resources.
It determines actions and behaviors of a single individual within a system.
It determines actions and behaviors of a single individual within a system.
It ensures that unauthorized modifications are not made to data by authorized personnel or processes.
It ensures that unauthorized modifications are not made to data by authorized personnel or processes.
Suggested answer: B
asked 18/09/2024
N C
48 questions
Total 395 questions
Go to page: of 40
Search

Related questions