ISC CAP Practice Test - Questions Answers, Page 23
List of questions
Related questions
Question 221
Which of the following are the types of access controls?
Each correct answer represents a complete solution. Choose three.
Question 222
You are the project manager of the NNQ Project for your company and are working you're your project team to define contingency plans for the risks within your project. Mary, one of your project team members, asks what a contingency plan is. Which of the following statements best defines what a contingency response is?
Question 223
Who is responsible for the stakeholder expectations management in a high-profile, high-risk project?
Question 224
Which of the following requires all general support systems and major applications to be fully certified and accredited before these systems and applications are put into production?
Each correct answer represents a part of the solution. Choose all that apply.
Question 225
Which of the following refers to a process that is used for implementing information security?
Question 226
What project management plan is most likely to direct the quantitative risk analysis process for a project in a matrix environment?
Question 227
Your project team has identified a project risk that must be responded to. The risk has been recorded in the risk register and the project team has been discussing potential risk responses for the risk event. The event is not likely to happen for several months but the probability of the event is high. Which one of the following is a valid response to the identified risk event?
Question 228
Which of the following documents is described in the statement below?
"It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning."
Question 229
Joan is a project management consultant and she has been hired by a firm to help them identify risk events within the project. Joan would first like to examine the project documents including the plans, assumptions lists, project files, and contracts. What key thing will help Joan to discover risks within the review of the project documents?
Question 230
Which of the following statements about the availability concept of Information security management is true?
Question