ExamGecko
Home Home / ISC / CAP

ISC CAP Practice Test - Questions Answers, Page 33

Question list
Search
Search

List of questions

Search

Related questions











You are the project manager of the NNN project for your company. You and the project team are working together to plan the risk responses for the project. You feel that the team has successfully completed the risk response planning and now you must initiate what risk process it is. Which of the following risk processes is repeated after the plan risk responses to determine if the overall project risk has been satisfactorily decreased?

A.
Risk identification
A.
Risk identification
Answers
B.
Qualitative risk analysis
B.
Qualitative risk analysis
Answers
C.
Risk response implementation
C.
Risk response implementation
Answers
D.
Quantitative risk analysis
D.
Quantitative risk analysis
Answers
Suggested answer: D

You are the project manager of QSL project for your organization. You are working you're your project team and several key stakeholders to create a diagram that shows how various elements of a system interrelate and the mechanism of causation within the system. What diagramming technique are you using as a part of the risk identification process?

A.
Cause and effect diagrams
A.
Cause and effect diagrams
Answers
B.
System or process flowcharts
B.
System or process flowcharts
Answers
C.
Predecessor and successor diagramming
C.
Predecessor and successor diagramming
Answers
D.
Influence diagrams
D.
Influence diagrams
Answers
Suggested answer: B

Which of the following statements about role-based access control (RBAC) model is true?

A.
In this model, the permissions are uniquely assigned to each user account.
A.
In this model, the permissions are uniquely assigned to each user account.
Answers
B.
In this model, a user can access resources according to his role in the organization.
B.
In this model, a user can access resources according to his role in the organization.
Answers
C.
In this model, the same permission is assigned to each user account.
C.
In this model, the same permission is assigned to each user account.
Answers
D.
In this model, the users can access resources according to their seniority.
D.
In this model, the users can access resources according to their seniority.
Answers
Suggested answer: B

The Project Risk Management knowledge area focuses on which of the following processes? Each correct answer represents a complete solution. Choose all that apply.

A.
Quantitative Risk Analysis
A.
Quantitative Risk Analysis
Answers
B.
Potential Risk Monitoring
B.
Potential Risk Monitoring
Answers
C.
Risk Monitoring and Control
C.
Risk Monitoring and Control
Answers
D.
Risk Management Planning
D.
Risk Management Planning
Answers
Suggested answer: A, C, D

Certification and Accreditation (C&A or CnA) is a process for implementing information security. Which of the following is the correct order of C&A phases in a

DITSCAP assessment?

A.
Definition, Validation, Verification, and Post Accreditation
A.
Definition, Validation, Verification, and Post Accreditation
Answers
B.
Verification, Definition, Validation, and Post Accreditation
B.
Verification, Definition, Validation, and Post Accreditation
Answers
C.
Definition, Verification, Validation, and Post Accreditation
C.
Definition, Verification, Validation, and Post Accreditation
Answers
D.
Verification, Validation, Definition, and Post Accreditation
D.
Verification, Validation, Definition, and Post Accreditation
Answers
Suggested answer: C

There are seven risk responses for any project. Which one of the following is a valid risk response for a negative risk event?

A.
Exploit
A.
Exploit
Answers
B.
Share
B.
Share
Answers
C.
Enhance
C.
Enhance
Answers
D.
Acceptance
D.
Acceptance
Answers
Suggested answer: D

Which of the following persons is responsible for testing and verifying whether the security policy is properly implemented, and the derived security solutions are adequate or not?

A.
Auditor
A.
Auditor
Answers
B.
User
B.
User
Answers
C.
Data custodian
C.
Data custodian
Answers
D.
Data owner
D.
Data owner
Answers
Suggested answer: A

Which of the following processes provides a standard set of activities, general tasks, and a management structure to certify and accredit systems, which maintain the information assurance and the security posture of a system or site?

A.
DITSCAP
A.
DITSCAP
Answers
B.
NIACAP
B.
NIACAP
Answers
C.
NSA-IAM
C.
NSA-IAM
Answers
D.
ASSET
D.
ASSET
Answers
Suggested answer: B

You work as a project manager for BlueWell Inc. You are working on a project and the management wants a rapid and cost-effective means for establishing priorities for planning risk responses in your project. Which risk management process can satisfy management's objective for your project?

A.
Qualitative risk analysis
A.
Qualitative risk analysis
Answers
B.
Quantitative analysis
B.
Quantitative analysis
Answers
C.
Historical information
C.
Historical information
Answers
D.
Rolling wave planning
D.
Rolling wave planning
Answers
Suggested answer: A

Which of the following statements best describes the difference between the role of a data owner and the role of a data custodian?

A.
The custodian implements the information classification scheme after the initial assignment by the operations manager.
A.
The custodian implements the information classification scheme after the initial assignment by the operations manager.
Answers
B.
The data custodian implements the information classification scheme after the initial assignment by the data owner.
B.
The data custodian implements the information classification scheme after the initial assignment by the data owner.
Answers
C.
The data owner implements the information classification scheme after the initial assignment by the custodian.
C.
The data owner implements the information classification scheme after the initial assignment by the custodian.
Answers
D.
The custodian makes the initial information classification assignments, and the operations manager implements the scheme.
D.
The custodian makes the initial information classification assignments, and the operations manager implements the scheme.
Answers
Suggested answer: B
Total 395 questions
Go to page: of 40