ExamGecko
Home Home / ISC / CAP

ISC CAP Practice Test - Questions Answers, Page 30

Question list
Search
Search

List of questions

Search

Related questions











Which of the following tasks are identified by the Plan of Action and Milestones document? Each correct answer represents a complete solution. Choose all that apply.

A.
The plans that need to be implemented
A.
The plans that need to be implemented
Answers
B.
The resources needed to accomplish the elements of the plan
B.
The resources needed to accomplish the elements of the plan
Answers
C.
Any milestones that are needed in meeting the tasks
C.
Any milestones that are needed in meeting the tasks
Answers
D.
The tasks that are required to be accomplished
D.
The tasks that are required to be accomplished
Answers
E.
Scheduled completion dates for the milestones
E.
Scheduled completion dates for the milestones
Answers
Suggested answer: B, C, D, E

Jenny is the project manager for the NBT projects. She is working with the project team and several subject matter experts to perform the quantitative risk analysis process. During this process she and the project team uncover several risks events that were not previously identified. What should Jenny do with these risk events?

A.
The events should be determined if they need to be accepted or responded to.
A.
The events should be determined if they need to be accepted or responded to.
Answers
B.
The events should be entered into qualitative risk analysis.
B.
The events should be entered into qualitative risk analysis.
Answers
C.
The events should continue on with quantitative risk analysis.
C.
The events should continue on with quantitative risk analysis.
Answers
D.
The events should be entered into the risk register.
D.
The events should be entered into the risk register.
Answers
Suggested answer: D

Shoulder surfing is a type of in-person attack in which the attacker gathers information about the premises of an organization. This attack is often performed by looking surreptitiously at the keyboard of an employee's computer while he is typing in his password at any access point such as a terminal/Web site. Which of the following is violated in a shoulder surfing attack?

A.
Authenticity
A.
Authenticity
Answers
B.
Confidentiality
B.
Confidentiality
Answers
C.
Availability
C.
Availability
Answers
D.
Integrity
D.
Integrity
Answers
Suggested answer: B

Harry is the project manager of the MMQ Construction Project. In this project Harry has identified a supplier who can create stained glass windows for 1,000 window units in the construction project. The supplier is an artist who works by himself, but creates windows for several companies throughout the United States. Management reviews the proposal to use this supplier and while they agree that the supplier is talented, they do not think the artist can fulfill the 1,000 window units in time for the project's deadline. Management asked Harry to find a supplier who will guarantee the completion of the windows by the needed date in the schedule. What risk response has management asked Harry to implement?

A.
Acceptance
A.
Acceptance
Answers
B.
Mitigation
B.
Mitigation
Answers
C.
Avoidance
C.
Avoidance
Answers
D.
Transference
D.
Transference
Answers
Suggested answer: B

You are the project manager of the BlueStar project in your company. Your company is structured as a functional organization and you report to the functional manager that you are ready to move onto the qualitative risk analysis process. What will you need as inputs for the qualitative risk analysis of the project in this scenario?

A.
You will need the risk register, risk management plan, project scope statement, and any relevant organizational process assets.
A.
You will need the risk register, risk management plan, project scope statement, and any relevant organizational process assets.
Answers
B.
You will need the risk register, risk management plan, outputs of qualitative risk analysis, and any relevant organizational process assets.
B.
You will need the risk register, risk management plan, outputs of qualitative risk analysis, and any relevant organizational process assets.
Answers
C.
You will need the risk register, risk management plan, permission from the functional manager, and any relevant organizational process assets.
C.
You will need the risk register, risk management plan, permission from the functional manager, and any relevant organizational process assets.
Answers
D.
Qualitative risk analysis does not happen through the project manager in a functional struc ture.
D.
Qualitative risk analysis does not happen through the project manager in a functional struc ture.
Answers
Suggested answer: A

Henry is the project manager of the QBG Project for his company. This project has a budget of $4,576,900 and is expected to last 18 months to complete. The CIO, a stakeholder in the project, has introduced a scope change request for additional deliverables as part of the project work. What component of the change control system would review the proposed changes' impact on the features and functions of the project's product?

A.
Cost change control system
A.
Cost change control system
Answers
B.
Scope change control system
B.
Scope change control system
Answers
C.
Integrated change control
C.
Integrated change control
Answers
D.
Configuration management system
D.
Configuration management system
Answers
Suggested answer: D

Security Test and Evaluation (ST&E) is a component of risk assessment. It is useful in discovering system vulnerabilities. For what purposes is ST&E used?

Each correct answer represents a complete solution. Choose all that apply.

A.
To implement the design of system architecture
A.
To implement the design of system architecture
Answers
B.
To determine the adequacy of security mechanisms, assurances, and other properties to enforce the security policy
B.
To determine the adequacy of security mechanisms, assurances, and other properties to enforce the security policy
Answers
C.
To assess the degree of consistency between the system documentation and its implement ation
C.
To assess the degree of consistency between the system documentation and its implement ation
Answers
D.
To uncover design, implementation, and operational flaws that may allow the violation of security policy
D.
To uncover design, implementation, and operational flaws that may allow the violation of security policy
Answers
Suggested answer: B, C, D

Which of the following are the goals of risk management?

Each correct answer represents a complete solution. Choose three.

A.
Finding an economic balance between the impact of the risk and the cost of the counterme asure
A.
Finding an economic balance between the impact of the risk and the cost of the counterme asure
Answers
B.
Identifying the risk
B.
Identifying the risk
Answers
C.
Assessing the impact of potential threats
C.
Assessing the impact of potential threats
Answers
D.
Identifying the accused
D.
Identifying the accused
Answers
Suggested answer: A, B, C

Elizabeth is a project manager for her organization and she finds risk management to be very difficult for her to manage. She asks you, a lead project manager, at what stage in the project will risk management become easier. What answer best resolves the difficulty of risk management practices and the effort required?

A.
Risk management only becomes easier the more often it is practiced.
A.
Risk management only becomes easier the more often it is practiced.
Answers
B.
Risk management is an iterative process and never becomes easier.
B.
Risk management is an iterative process and never becomes easier.
Answers
C.
Risk management only becomes easier when the project moves into project execution.
C.
Risk management only becomes easier when the project moves into project execution.
Answers
D.
Risk management only becomes easier when the project is closed.
D.
Risk management only becomes easier when the project is closed.
Answers
Suggested answer: A

Which of the following is NOT an objective of the security program?

A.
Security organization
A.
Security organization
Answers
B.
Security plan
B.
Security plan
Answers
C.
Security education
C.
Security education
Answers
D.
Information classification
D.
Information classification
Answers
Suggested answer: B
Total 395 questions
Go to page: of 40