Pass4itsure > ISC > ISC Certification > CAP > CAP Online Practice Questions and Answers

CAP Online Practice Questions and Answers

Questions 4

Which of the following assessment methodologies defines a six-step technical security evaluation?

A. FITSAF

B. FIPS 102

C. OCTAVE

D. DITSCAP

Buy Now
Questions 5

Gary is the project manager of his organization. He is managing a project that is similar to a project his organization completed recently. Gary has decided that he will use the information from the past project to help him and the project team to identify the risks that may be present in the project. Management agrees that this checklist approach is ideal and will save time in the project. Which of the following statement is most accurate about the limitations of the checklist analysis approach for Gary?

A. The checklist analysis approach is fast but it is impossible to build and exhaustive checklist.

B. The checklist analysis approach only uses qualitative analysis.

C. The checklist analysis approach saves time, but can cost more.

D. The checklist is also known as top down risk assessment

Buy Now
Questions 6

Thomas is a key stakeholder in your project. Thomas has requested several changes to the project scope for the project you are managing. Upon review of the proposed changes, you have discovered that these new requirements are laden with risks and you recommend to the change control board that the changes be excluded from the project scope. The change control board agrees with you. What component of the change control system communicates the approval or denial of a proposed change request?

A. Configuration management system

B. Change log

C. Scope change control system

D. Integrated change control

Buy Now
Questions 7

FITSAF stands for Federal Information Technology Security Assessment Framework. It is a methodology for assessing the security of information systems. Which of the following FITSAF levels shows that the procedures and controls have been implemented?

A. Level 2

B. Level 3

C. Level 5

D. Level 4

E. Level 1

Buy Now
Questions 8

You are the project manager for your company and a new change request has been approved for your project. This change request, however, has introduced several new risks to the project. You have communicated these risk events and the project stakeholders understand the possible effects these risks could have on your project. You elect to create a mitigation response for the identified risk events. Where will you record the mitigation response?

A. Risk register

B. Risk log

C. Risk management plan

D. Project management plan

Buy Now
Questions 9

Which of the following documents is used to provide a standard approach to the assessment of NIST SP 800-53 security controls?

A. NIST SP 800-37

B. NIST SP 800-41

C. NIST SP 800-53A

D. NIST SP 800-66

Buy Now
Questions 10

Which of the following refers to a process that is used for implementing information security?

A. Certification and Accreditation(CandA)

B. Information Assurance (IA)

C. Five Pillars model

D. Classic information security model

Buy Now
Questions 11

Which of the following is not a part of Identify Risks process?

A. Decision tree diagram

B. Cause and effect diagram

C. Influence diagram

D. System or process flow chart

Buy Now
Questions 12

Which of the following individuals is responsible for configuration management and control task?

A. Commoncontrol provider

B. Information system owner

C. Authorizing official

D. Chief information officer

Buy Now
Questions 13

Which one of the following is the only output for the qualitative risk analysis process?

A. Enterprise environmental factors

B. Project management plan

C. Risk register updates

D. Organizational process assets

Buy Now
Exam Code: CAP
Exam Name: CAP - Certified Authorization Professional
Last Update:
Questions: 395
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99