ISC CAP Practice Test - Questions Answers, Page 23
List of questions
Related questions
Which of the following are the types of access controls?
Each correct answer represents a complete solution. Choose three.
You are the project manager of the NNQ Project for your company and are working you're your project team to define contingency plans for the risks within your project. Mary, one of your project team members, asks what a contingency plan is. Which of the following statements best defines what a contingency response is?
Who is responsible for the stakeholder expectations management in a high-profile, high-risk project?
Which of the following requires all general support systems and major applications to be fully certified and accredited before these systems and applications are put into production?
Each correct answer represents a part of the solution. Choose all that apply.
Which of the following refers to a process that is used for implementing information security?
What project management plan is most likely to direct the quantitative risk analysis process for a project in a matrix environment?
Your project team has identified a project risk that must be responded to. The risk has been recorded in the risk register and the project team has been discussing potential risk responses for the risk event. The event is not likely to happen for several months but the probability of the event is high. Which one of the following is a valid response to the identified risk event?
Which of the following documents is described in the statement below?
"It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning."
Joan is a project management consultant and she has been hired by a firm to help them identify risk events within the project. Joan would first like to examine the project documents including the plans, assumptions lists, project files, and contracts. What key thing will help Joan to discover risks within the review of the project documents?
Which of the following statements about the availability concept of Information security management is true?
Question