ExamGecko
Home Home / ISC / CAP

ISC CAP Practice Test - Questions Answers, Page 35

Question list
Search
Search

Related questions











Which of the following individuals is responsible for the final accreditation decision?

A.
Information System Owner
A.
Information System Owner
Answers
B.
Certification Agent
B.
Certification Agent
Answers
C.
User Representative
C.
User Representative
Answers
D.
Risk Executive
D.
Risk Executive
Answers
Suggested answer: A

Which of the following is a risk that is created by the response to another risk?

A.
Secondary risk
A.
Secondary risk
Answers
B.
Residual risk
B.
Residual risk
Answers
C.
Positive risk
C.
Positive risk
Answers
D.
Negative risk
D.
Negative risk
Answers
Suggested answer: A

Which of the following processes has the goal to ensure that any change does not lead to reduced or compromised security?

A.
Risk management
A.
Risk management
Answers
B.
Security management
B.
Security management
Answers
C.
Configuration management
C.
Configuration management
Answers
D.
Change control management
D.
Change control management
Answers
Suggested answer: D

Which of the following is not a part of Identify Risks process?

A.
Decision tree diagram
A.
Decision tree diagram
Answers
B.
Cause and effect diagram
B.
Cause and effect diagram
Answers
C.
Influence diagram
C.
Influence diagram
Answers
D.
System or process flow chart
D.
System or process flow chart
Answers
Suggested answer: A

In which of the following phases does the SSAA maintenance take place?

A.
Phase 4
A.
Phase 4
Answers
B.
Phase 2
B.
Phase 2
Answers
C.
Phase 1
C.
Phase 1
Answers
D.
Phase 3
D.
Phase 3
Answers
Suggested answer: A

Which of the following statements is true about the continuous monitoring process?

A.
It takes place in the middle of system security accreditation.
A.
It takes place in the middle of system security accreditation.
Answers
B.
It takes place before and after system security accreditation.
B.
It takes place before and after system security accreditation.
Answers
C.
It takes place before the initial system security accreditation.
C.
It takes place before the initial system security accreditation.
Answers
D.
It takes place after the initial system security accreditation.
D.
It takes place after the initial system security accreditation.
Answers
Suggested answer: D

In which of the following phases do the system security plan update and the Plan of Action and Milestones (POAM) update take place?

A.
Continuous Monitoring Phase
A.
Continuous Monitoring Phase
Answers
B.
Accreditation Phase
B.
Accreditation Phase
Answers
C.
Preparation Phase
C.
Preparation Phase
Answers
D.
DITSCAP Phase
D.
DITSCAP Phase
Answers
Suggested answer: A

In which of the following phases does the change management process start?

A.
Phase 2
A.
Phase 2
Answers
B.
Phase 1
B.
Phase 1
Answers
C.
Phase 4
C.
Phase 4
Answers
D.
Phase 3
D.
Phase 3
Answers
Suggested answer: C

Which of the following assessment methods involves observing or conducting the operation of physical devices?

A.
Interview
A.
Interview
Answers
B.
Deviation
B.
Deviation
Answers
C.
Examination
C.
Examination
Answers
D.
Testing
D.
Testing
Answers
Suggested answer: D

Which of the following individuals is responsible for configuration management and control task?

A.
Authorizing official
A.
Authorizing official
Answers
B.
Information system owner
B.
Information system owner
Answers
C.
Chief information officer
C.
Chief information officer
Answers
D.
Common control provider
D.
Common control provider
Answers
Suggested answer: B
Total 395 questions
Go to page: of 40