ExamGecko
Home Home / ISC / CAP

ISC CAP Practice Test - Questions Answers, Page 39

Question list
Search
Search

List of questions

Search

Related questions











Which one of the following is the only output for the qualitative risk analysis process?

A.
Enterprise environmental factors
A.
Enterprise environmental factors
Answers
B.
Project management plan
B.
Project management plan
Answers
C.
Risk register updates
C.
Risk register updates
Answers
D.
Organizational process assets
D.
Organizational process assets
Answers
Suggested answer: C

Which of the following RMF phases is known as risk analysis?

A.
Phase 0
A.
Phase 0
Answers
B.
Phase 1
B.
Phase 1
Answers
C.
Phase 2
C.
Phase 2
Answers
D.
Phase 3
D.
Phase 3
Answers
Suggested answer: C

You work as a project manager for BlueWell Inc. There has been a delay in your project work that is adversely affecting the project schedule. You decided, with your stakeholders' approval, to fast track the project work to get the project done faster. When you fast track the project which of the following are likely to increase?

A.
Risks
A.
Risks
Answers
B.
Human resource needs
B.
Human resource needs
Answers
C.
Quality control concerns
C.
Quality control concerns
Answers
D.
Costs
D.
Costs
Answers
Suggested answer: A

An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?

A.
Anonymous
A.
Anonymous
Answers
B.
Multi-factor
B.
Multi-factor
Answers
C.
Biometrics
C.
Biometrics
Answers
D.
Mutual
D.
Mutual
Answers
Suggested answer: B

In 2003, NIST developed a new Certification & Accreditation (C&A) guideline known as FIPS 199.

What levels of potential impact are defined by FIPS 199?

Each correct answer represents a complete solution. Choose all that apply.

A.
Low
A.
Low
Answers
B.
Moderate
B.
Moderate
Answers
C.
High
C.
High
Answers
D.
Medium
D.
Medium
Answers
Suggested answer: A, C, D

Which of the following is NOT an objective of the security program?

A.
Security organization
A.
Security organization
Answers
B.
Security plan
B.
Security plan
Answers
C.
Security education
C.
Security education
Answers
D.
Information classification
D.
Information classification
Answers
Suggested answer: B

Walter is the project manager of a large construction project. He'll be working with several vendors on the project. Vendors will be providing materials and labor for several parts of the project. Some of the works in the project are very dangerous so Walter has implemented safety requirements for all of the vendors and his own project team. Stakeholders for the project have added new requirements, which have caused new risks in the project. A vendor has identified a new risk that could affect the project if it comes into fruition. Walter agrees with the vendor and has updated the risk register and created potential risk responses to mitigate the risk. What should Walter also update in this scenario considering the risk event?

A.
Project contractual relationship with the vendor
A.
Project contractual relationship with the vendor
Answers
B.
Project communications plan
B.
Project communications plan
Answers
C.
Project management plan
C.
Project management plan
Answers
D.
Project scope statement
D.
Project scope statement
Answers
Suggested answer: C

During which of the following processes, probability and impact matrix is prepared?

A.
Plan Risk Responses
A.
Plan Risk Responses
Answers
B.
Perform Quantitative Risk Analysis
B.
Perform Quantitative Risk Analysis
Answers
C.
Perform Qualitative Risk Analysis
C.
Perform Qualitative Risk Analysis
Answers
D.
Monitoring and Control Risks
D.
Monitoring and Control Risks
Answers
Suggested answer: C

During qualitative risk analysis you want to define the risk urgency assessment. All of the following are indicators of risk priority except for which one?

A.
Symptoms
A.
Symptoms
Answers
B.
Cost of the project
B.
Cost of the project
Answers
C.
Warning signs
C.
Warning signs
Answers
D.
Risk rating
D.
Risk rating
Answers
Suggested answer: B

Which of the following statements about Discretionary Access Control List (DACL) is true?

A.
It is a rule list containing access control entries.
A.
It is a rule list containing access control entries.
Answers
B.
It specifies whether an audit activity should be performed when an object attempts to access a resource.
B.
It specifies whether an audit activity should be performed when an object attempts to access a resource.
Answers
C.
It is a list containing user accounts, groups, and computers that are allowed (or denied) access to the object.
C.
It is a list containing user accounts, groups, and computers that are allowed (or denied) access to the object.
Answers
D.
It is a unique number that identifies a user, group, and computer account
D.
It is a unique number that identifies a user, group, and computer account
Answers
Suggested answer: C
Total 395 questions
Go to page: of 40