ExamGecko
Home Home / ISC / CAP

ISC CAP Practice Test - Questions Answers, Page 34

Question list
Search
Search

Related questions











Which of the following NIST C&A documents is the guideline for identifying an information system as a National Security System?

A.
NIST SP 800-53
A.
NIST SP 800-53
Answers
B.
NIST SP 800-59
B.
NIST SP 800-59
Answers
C.
NIST SP 800-37
C.
NIST SP 800-37
Answers
D.
NIST SP 800-53A
D.
NIST SP 800-53A
Answers
Suggested answer: B

Which of the following system security policies is used to address specific issues of concern to the organization?

A.
Program policy
A.
Program policy
Answers
B.
Issue-specific policy
B.
Issue-specific policy
Answers
C.
Informative policy
C.
Informative policy
Answers
D.
System-specific policy
D.
System-specific policy
Answers
Suggested answer: B

Which of the following individuals is responsible for ensuring the security posture of the organization's information system?

A.
Authorizing Official
A.
Authorizing Official
Answers
B.
Chief Information Officer
B.
Chief Information Officer
Answers
C.
Security Control Assessor
C.
Security Control Assessor
Answers
D.
Common Control Provider
D.
Common Control Provider
Answers
Suggested answer: A

In which of the following Risk Management Framework (RMF) phases is a risk profile created for threats?

A.
Phase 3
A.
Phase 3
Answers
B.
Phase 1
B.
Phase 1
Answers
C.
Phase 2
C.
Phase 2
Answers
D.
Phase 0
D.
Phase 0
Answers
Suggested answer: C

In which of the following DITSCAP phases is the SSAA developed?

A.
Phase 4
A.
Phase 4
Answers
B.
Phase 2
B.
Phase 2
Answers
C.
Phase 1
C.
Phase 1
Answers
D.
Phase 3
D.
Phase 3
Answers
Suggested answer: C

Which of the following recovery plans includes a monitoring process and triggers for initiating planned actions?

A.
Contingency plan
A.
Contingency plan
Answers
B.
Business continuity plan
B.
Business continuity plan
Answers
C.
Disaster recovery plan
C.
Disaster recovery plan
Answers
D.
Continuity of Operations Plan
D.
Continuity of Operations Plan
Answers
Suggested answer: A

What does RTM stand for?

A.
Resource Testing Method
A.
Resource Testing Method
Answers
B.
Replaced Traceability Matrix
B.
Replaced Traceability Matrix
Answers
C.
Requirements Traceability Matrix
C.
Requirements Traceability Matrix
Answers
D.
Resource Tracking Matrix
D.
Resource Tracking Matrix
Answers
Suggested answer: C

Which of the following parts of BS 7799 covers risk analysis and management?

A.
Part 1
A.
Part 1
Answers
B.
Part 3
B.
Part 3
Answers
C.
Part 2
C.
Part 2
Answers
D.
Part 4
D.
Part 4
Answers
Suggested answer: B

Which of the following NIST documents includes components for penetration testing?

A.
NIST SP 800-53
A.
NIST SP 800-53
Answers
B.
NIST SP 800-26
B.
NIST SP 800-26
Answers
C.
NIST SP 800-37
C.
NIST SP 800-37
Answers
D.
NIST SP 800-30
D.
NIST SP 800-30
Answers
Suggested answer: D

According to FIPS Publication 199, what are the three levels of potential impact on organizations in the event of a compromise on confidentiality, integrity, and availability?

A.
Confidential, Secret, and High
A.
Confidential, Secret, and High
Answers
B.
Minimum, Moderate, and High
B.
Minimum, Moderate, and High
Answers
C.
Low, Normal, and High
C.
Low, Normal, and High
Answers
D.
Low, Moderate, and High
D.
Low, Moderate, and High
Answers
Suggested answer: D
Total 395 questions
Go to page: of 40