ExamGecko
Home Home / ISC / CAP

ISC CAP Practice Test - Questions Answers, Page 31

Question list
Search
Search

List of questions

Search

Related questions











Which of the following RMF phases identifies key threats and vulnerabilities that could compromise the confidentiality, integrity, and availability of the institutional critical assets?

A.
Phase 2
A.
Phase 2
Answers
B.
Phase 1
B.
Phase 1
Answers
C.
Phase 3
C.
Phase 3
Answers
D.
Phase 0
D.
Phase 0
Answers
Suggested answer: B

You are the project manager of the NHQ project for your company. Management has told you that you must implement an agreed upon contingency response if the Cost Performance Index in your project is less than 0.90. Consider that your project has a budget at completion of $250,000 and is 60 percent complete. You are scheduled to be however, 75 percent complete, and you have spent $165,000 to date. What is the Cost Performance Index for this project to determine if the contingency response should happen?

A.
0.88
A.
0.88
Answers
B.
0.80
B.
0.80
Answers
C.
-$37,500
C.
-$37,500
Answers
D.
0.91
D.
0.91
Answers
Suggested answer: D

Bill is the project manager of the JKH Project. He and the project team have identified a risk event in the project with a high probability of occurrence and the risk event has a high cost impact on the project. Bill discusses the risk event with Virginia, the primary project customer, and she decides that the requirements surrounding the risk event should be removed from the project. The removal of the requirements does affect the project scope, but it can release the project from the high risk exposure. What risk response has been enacted in this project?

A.
Avoidance
A.
Avoidance
Answers
B.
Acceptance
B.
Acceptance
Answers
C.
Transference
C.
Transference
Answers
D.
Mitigation
D.
Mitigation
Answers
Suggested answer: A

In what portion of a project are risk and opportunities greatest and require intense planning and anticipation of risk events?

A.
Planning
A.
Planning
Answers
B.
Executing
B.
Executing
Answers
C.
Closing
C.
Closing
Answers
D.
Initiating
D.
Initiating
Answers
Suggested answer: D

You work as a project manager for BlueWell Inc. You with your team are using a method or a (technical) process that conceives the risks even if all theoretically possible safety measures would be applied. One of your team member wants to know that what is a residual risk. What will you reply to your team member?

A.
It is a risk that remains because no risk response is taken.
A.
It is a risk that remains because no risk response is taken.
Answers
B.
It is a risk that remains after planned risk responses are taken.
B.
It is a risk that remains after planned risk responses are taken.
Answers
C.
It is a risk that can not be addressed by a risk response.
C.
It is a risk that can not be addressed by a risk response.
Answers
D.
It is a risk that will remain no matter what type of risk response is offered.
D.
It is a risk that will remain no matter what type of risk response is offered.
Answers
Suggested answer: B

You are the project manager for your organization. You are preparing for the quantitative risk analysis. Mark, a project team member, wants to know why you need to do quantitative risk analysis when you just completed qualitative risk analysis. Which one of the following statements best defines what quantitative risk analysis is?

A.
Quantitative risk analysis is the planning and quantification of risk responses based on probability and impact of each risk event.
A.
Quantitative risk analysis is the planning and quantification of risk responses based on probability and impact of each risk event.
Answers
B.
Quantitative risk analysis is the process of prioritizing risks for further analysis or action by assessing and combining their probability of occurrence and impact.
B.
Quantitative risk analysis is the process of prioritizing risks for further analysis or action by assessing and combining their probability of occurrence and impact.
Answers
C.
Quantitative risk analysis is the review of the risk events with the high probability and the highest impact on the project objectives.
C.
Quantitative risk analysis is the review of the risk events with the high probability and the highest impact on the project objectives.
Answers
D.
Quantitative risk analysis is the process of numerically analyzing the effect of identified risks on overall project objectives.
D.
Quantitative risk analysis is the process of numerically analyzing the effect of identified risks on overall project objectives.
Answers
Suggested answer: D

Fred is the project manager of the CPS project. He is working with his project team to prioritize the identified risks within the CPS project. He and the team are prioritizing risks for further analysis or action by assessing and combining the risks probability of occurrence and impact. What process is Fred completing?

A.
Risk identification
A.
Risk identification
Answers
B.
Perform qualitative analysis
B.
Perform qualitative analysis
Answers
C.
Perform quantitative analysis
C.
Perform quantitative analysis
Answers
D.
Risk Breakdown Structure creation
D.
Risk Breakdown Structure creation
Answers
Suggested answer: B

Diane is the project manager of the HGF Project. A risk that has been identified and analyzed in the project planning processes is now coming into fruition. What individual should respond to the risk with the preplanned risk response?

A.
Diane
A.
Diane
Answers
B.
Risk owner
B.
Risk owner
Answers
C.
Subject matter expert
C.
Subject matter expert
Answers
D.
Project sponsor
D.
Project sponsor
Answers
Suggested answer: B

Ned is the project manager of the HNN project for your company. Ned has asked you to help him complete some probability distributions for his project. What portion of the project will you most likely use for probability distributions?

A.
Uncertainty in values such as duration of schedule activities
A.
Uncertainty in values such as duration of schedule activities
Answers
B.
Bias towards risk in new resources
B.
Bias towards risk in new resources
Answers
C.
Risk probability and impact matrixes
C.
Risk probability and impact matrixes
Answers
D.
Risk identification
D.
Risk identification
Answers
Suggested answer: A

Which of the following acts promote a risk-based policy for cost effective security? Each correct answer represents a part of the solution. Choose all that apply.

A.
Clinger-Cohen Act
A.
Clinger-Cohen Act
Answers
B.
Lanham Act
B.
Lanham Act
Answers
C.
Computer Misuse Act
C.
Computer Misuse Act
Answers
D.
Paperwork Reduction Act (PRA)
D.
Paperwork Reduction Act (PRA)
Answers
Suggested answer: A, D
Total 395 questions
Go to page: of 40