ExamGecko
Home / ISC / CAP / List of questions
Ask Question

ISC CAP Practice Test - Questions Answers, Page 38

List of questions

Question 371

Report Export Collapse

Which of the following DoD directives is referred to as the Defense Automation Resources Management Manual?

Become a Premium Member for full access
  Unlock Premium Member

Question 372

Report Export Collapse

Management wants you to create a visual diagram of what resources will be utilized in the project deliverables. What type of a chart is management asking you to create?

Become a Premium Member for full access
  Unlock Premium Member

Question 373

Report Export Collapse

Shoulder surfing is a type of in-person attack in which the attacker gathers information about the premises of an organization. This attack is often performed by looking surreptitiously at the keyboard of an employee's computer while he is typing in his password at any access point such as a terminal/Web site. Which of the following is violated in a shoulder surfing attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 374

Report Export Collapse

Eric is the project manager of the NQQ Project and has hired the ZAS Corporation to complete part of the project work for Eric's organization. Due to a change request the ZAS Corporation is no longer needed on the project even though they have completed nearly all of the project work. Is Eric's organization liable to pay the ZAS Corporation for the work they have completed so far on the project?

Become a Premium Member for full access
  Unlock Premium Member

Question 375

Report Export Collapse

In which type of access control do user ID and password system come under?

Become a Premium Member for full access
  Unlock Premium Member

Question 376

Report Export Collapse

There are seven risk responses for any project. Which one of the following is a valid risk response for a negative risk event?

Become a Premium Member for full access
  Unlock Premium Member

Question 377

Report Export Collapse

Which of the following processes is described in the statement below?

"It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project."

Become a Premium Member for full access
  Unlock Premium Member

Question 378

Report Export Collapse

Which of the following DITSCAP phases validates that the preceding work has produced an IS that operates in a specified computing environment?

Become a Premium Member for full access
  Unlock Premium Member

Question 379

Report Export Collapse

Harry is a project manager of a software development project. In the early stages of planning, he and the stakeholders operated with the belief that the software they were developing would work with their organization's current computer operating system. Now that the project team has started developing the software it has become apparent that the software will not work with nearly half of the organization's computer operating systems. The incorrect belief Harry had in the software compatibility is an example of what in project management?

Become a Premium Member for full access
  Unlock Premium Member

Question 380

Report Export Collapse

The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the role of a supporter and advisor, respectively. Which of the following statements are true about ISSO and ISSE?

Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member
Total 395 questions
Go to page: of 40
Search

Related questions