ExamGecko
Home Home / ISC / CAP

ISC CAP Practice Test - Questions Answers, Page 40

Question list
Search
Search

Related questions











Which of the following is used to indicate that the software has met a defined quality level and is ready for mass distribution either by electronic means or by physical media?

A.
DAA
A.
DAA
Answers
B.
RTM
B.
RTM
Answers
C.
ATM
C.
ATM
Answers
D.
CRO
D.
CRO
Answers
Suggested answer: B

Which of the following processes is a structured approach to transitioning individuals, teams, and organizations from a current state to a desired future state?

A.
Configuration management
A.
Configuration management
Answers
B.
Procurement management
B.
Procurement management
Answers
C.
Change management
C.
Change management
Answers
D.
Risk management
D.
Risk management
Answers
Suggested answer: C

A security policy is an overall general statement produced by senior management that dictates what role security plays within the organization. What are the different types of policies?

Each correct answer represents a complete solution. Choose all that apply.

A.
Systematic
A.
Systematic
Answers
B.
Regulatory
B.
Regulatory
Answers
C.
Advisory
C.
Advisory
Answers
D.
Informative
D.
Informative
Answers
Suggested answer: B, C, D

Which of the following is a standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system?

A.
TCSEC
A.
TCSEC
Answers
B.
FIPS
B.
FIPS
Answers
C.
SSAA
C.
SSAA
Answers
D.
FITSAF
D.
FITSAF
Answers
Suggested answer: A

Which of the following statements correctly describes DIACAP residual risk?

A.
It is the remaining risk to the information system after risk palliation has occurred.
A.
It is the remaining risk to the information system after risk palliation has occurred.
Answers
B.
It is a process of security authorization.
B.
It is a process of security authorization.
Answers
C.
It is the technical implementation of the security design.
C.
It is the technical implementation of the security design.
Answers
D.
It is used to validate the information system.
D.
It is used to validate the information system.
Answers
Suggested answer: A

Explanation:


Total 395 questions
Go to page: of 40