ExamGecko
Home Home / ISC / CAP

ISC CAP Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











You are preparing to start the qualitative risk analysis process for your project. You will be relying on some organizational process assets to influence the process. Which one of the following is NOT a probable reason for relying on organizational process assets as an input for qualitative risk analysis?

A.
Information on prior, similar projects
A.
Information on prior, similar projects
Answers
B.
Review of vendor contracts to examine risks in past projects
B.
Review of vendor contracts to examine risks in past projects
Answers
C.
Risk databases that may be available from industry sources
C.
Risk databases that may be available from industry sources
Answers
D.
Studies of similar projects by risk specialists
D.
Studies of similar projects by risk specialists
Answers
Suggested answer: B

System Authorization is the risk management process. System Authorization Plan (SAP) is a comprehensive and uniform approach to the System Authorization

Process. What are the different phases of System Authorization Plan? Each correct answer represents a part of the solution. Choose all that apply.

A.
Pre-certification
A.
Pre-certification
Answers
B.
Certification
B.
Certification
Answers
C.
Post-certification
C.
Post-certification
Answers
D.
Authorization
D.
Authorization
Answers
E.
Post-Authorization
E.
Post-Authorization
Answers
Suggested answer: A, B, D, E

A part of a project deals with the hardware work. As a project manager, you have decided to hire a company to deal with all hardware work on the project. Which type of risk response is this?

A.
Avoidance
A.
Avoidance
Answers
B.
Mitigation
B.
Mitigation
Answers
C.
Exploit
C.
Exploit
Answers
D.
Transference
D.
Transference
Answers
Suggested answer: D

Risks with low ratings of probability and impact are included on a ____ for future monitoring.

A.
Watchlist
A.
Watchlist
Answers
B.
Risk alarm
B.
Risk alarm
Answers
C.
Observation list
C.
Observation list
Answers
D.
Risk register
D.
Risk register
Answers
Suggested answer: A

Penetration testing (also called pen testing) is the practice of testing a computer system, network, or Web application to find vulnerabilities that an attacker could exploit. Which of the following areas can be exploited in a penetration test? Each correct answer represents a complete solution. Choose all that apply.

A.
Social engineering
A.
Social engineering
Answers
B.
File and directory permissions
B.
File and directory permissions
Answers
C.
Buffer overflows
C.
Buffer overflows
Answers
D.
Kernel flaws
D.
Kernel flaws
Answers
E.
Race conditions
E.
Race conditions
Answers
F.
Information system architectures
F.
Information system architectures
Answers
G.
Trojan horses
G.
Trojan horses
Answers
Suggested answer: A, B, C, D, E, G

Frank is the project manager of the NHH Project. He is working with the project team to create a plan to document the procedures to manage risks throughout the project. This document will define how risks will be identified and quantified. It will also define how contingency plans will be implemented by the project team. What document is Frank and the NHH Project team creating in this scenario?

A.
Project management plan
A.
Project management plan
Answers
B.
Resource management plan
B.
Resource management plan
Answers
C.
Risk management plan
C.
Risk management plan
Answers
D.
Project plan
D.
Project plan
Answers
Suggested answer: C

In which of the following testing methodologies do assessors use all available documentation and work under no constraints, and attempt to circumvent the security features of an information system?

A.
Full operational test
A.
Full operational test
Answers
B.
Walk-through test
B.
Walk-through test
Answers
C.
Penetration test
C.
Penetration test
Answers
D.
Paper test
D.
Paper test
Answers
Suggested answer: C

Which of the following DITSCAP phases validates that the preceding work has produced an IS that operates in a specified computing environment?

A.
Phase 4
A.
Phase 4
Answers
B.
Phase 3
B.
Phase 3
Answers
C.
Phase 2
C.
Phase 2
Answers
D.
Phase 1
D.
Phase 1
Answers
Suggested answer: B

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?

A.
Safeguards
A.
Safeguards
Answers
B.
Preventive controls
B.
Preventive controls
Answers
C.
Detective controls
C.
Detective controls
Answers
D.
Corrective controls
D.
Corrective controls
Answers
Suggested answer: D

Which of the following roles is also known as the accreditor?

A.
Chief Risk Officer
A.
Chief Risk Officer
Answers
B.
Data owner
B.
Data owner
Answers
C.
Designated Approving Authority
C.
Designated Approving Authority
Answers
D.
Chief Information Officer
D.
Chief Information Officer
Answers
Suggested answer: C
Total 395 questions
Go to page: of 40