ExamGecko
Home Home / ISC / CAP

ISC CAP Practice Test - Questions Answers, Page 25

Question list
Search
Search

List of questions

Search

Related questions











Penetration tests are sometimes called white hat attacks because in a pen test, the good guys are attempting to break in. What are the different categories of penetration testing?

Each correct answer represents a complete solution. Choose all that apply.

A.
Full-box
A.
Full-box
Answers
B.
Zero-knowledge test
B.
Zero-knowledge test
Answers
C.
Full-knowledge test
C.
Full-knowledge test
Answers
D.
Open-box
D.
Open-box
Answers
E.
Partial-knowledge test
E.
Partial-knowledge test
Answers
F.
Closed-box
F.
Closed-box
Answers
Suggested answer: B, C, D, E, F

You are the project manager for TTP project. You are in the Identify Risks process. You have to create the risk register. Which of the following are included in the risk register?

Each correct answer represents a complete solution. Choose two.

A.
List of potential responses
A.
List of potential responses
Answers
B.
List of identified risks
B.
List of identified risks
Answers
C.
List of mitigation techniques
C.
List of mitigation techniques
Answers
D.
List of key stakeholders
D.
List of key stakeholders
Answers
Suggested answer: A, B

The Software Configuration Management (SCM) process defines the need to trace changes, and the ability to verify that the final delivered software has all of the planned enhancements that are supposed to be included in the release. What are the procedures that must be defined for each software project to ensure that a sound SCM process is implemented?

Each correct answer represents a complete solution. Choose all that apply.

A.
Configuration status accounting
A.
Configuration status accounting
Answers
B.
Configuration change control
B.
Configuration change control
Answers
C.
Configuration deployment
C.
Configuration deployment
Answers
D.
Configuration audits
D.
Configuration audits
Answers
E.
Configuration identification
E.
Configuration identification
Answers
F.
Configuration implementation
F.
Configuration implementation
Answers
Suggested answer: A, B, D, E

Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?

A.
FIPS
A.
FIPS
Answers
B.
TCSEC
B.
TCSEC
Answers
C.
SSAA
C.
SSAA
Answers
D.
FITSAF
D.
FITSAF
Answers
Suggested answer: C

The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. Which of the following participants are required in a NIACAP security assessment?

Each correct answer represents a part of the solution. Choose all that apply.

A.
Information Assurance Manager
A.
Information Assurance Manager
Answers
B.
Designated Approving Authority
B.
Designated Approving Authority
Answers
C.
IS program manager
C.
IS program manager
Answers
D.
User representative
D.
User representative
Answers
E.
Certification agent
E.
Certification agent
Answers
Suggested answer: B, C, D, E

Which of the following processes is described in the statement below?

"It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project."

A.
Perform Quantitative Risk Analysis
A.
Perform Quantitative Risk Analysis
Answers
B.
Perform Qualitative Risk Analysis
B.
Perform Qualitative Risk Analysis
Answers
C.
Monitor and Control Risks
C.
Monitor and Control Risks
Answers
D.
Identify Risks
D.
Identify Risks
Answers
Suggested answer: C

There are seven risk responses for any project. Which one of the following is a valid risk response for a negative risk event?

A.
Enhance
A.
Enhance
Answers
B.
Exploit
B.
Exploit
Answers
C.
Acceptance
C.
Acceptance
Answers
D.
Share
D.
Share
Answers
Suggested answer: C

The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. What are the different types of NIACAP accreditation?

Each correct answer represents a complete solution. Choose all that apply.

A.
System accreditation
A.
System accreditation
Answers
B.
Type accreditation
B.
Type accreditation
Answers
C.
Site accreditation
C.
Site accreditation
Answers
D.
Secure accreditation
D.
Secure accreditation
Answers
Suggested answer: A, B, C

You are the project manager of the GHY Project for your company. You have completed the risk response planning with your project team. You now need to update the WBS. Why would the project manager need to update the WBS after the risk response planning process? Choose the best answer.

A.
Because of risks associated with work packages
A.
Because of risks associated with work packages
Answers
B.
Because of work that was omitted during the WBS creation
B.
Because of work that was omitted during the WBS creation
Answers
C.
Because of risk responses that are now activities
C.
Because of risk responses that are now activities
Answers
D.
Because of new work generated by the risk responses
D.
Because of new work generated by the risk responses
Answers
Suggested answer: D

The risk transference is referred to the transfer of risks to a third party, usually for a fee, it creates a contractual-relationship for the third party to manage the risk on behalf of the performing organization. Which one of the following is NOT an example of the transference risk response?

A.
Use of insurance
A.
Use of insurance
Answers
B.
Life cycle costing
B.
Life cycle costing
Answers
C.
Warranties
C.
Warranties
Answers
D.
Performance bonds
D.
Performance bonds
Answers
Suggested answer: B
Total 395 questions
Go to page: of 40