ISC CAP Exam Practice Questions (P. 5)
- Full Access (395 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #41
You are preparing to start the qualitative risk analysis process for your project. You will be relying on some organizational process assets to influence the process.
Which one of the following is NOT a probable reason for relying on organizational process assets as an input for qualitative risk analysis?
Which one of the following is NOT a probable reason for relying on organizational process assets as an input for qualitative risk analysis?
- AInformation on prior, similar projects
- BReview of vendor contracts to examine risks in past projects
- CRisk databases that may be available from industry sources
- DStudies of similar projects by risk specialists
Correct Answer:
B
B
send
light_mode
delete
Question #42
System Authorization is the risk management process. System Authorization Plan (SAP) is a comprehensive and uniform approach to the System Authorization
Process. What are the different phases of System Authorization Plan?
Each correct answer represents a part of the solution. Choose all that apply.
Process. What are the different phases of System Authorization Plan?
Each correct answer represents a part of the solution. Choose all that apply.
- APre-certification
- BCertification
- CPost-certification
- DAuthorization
- EPost-Authorization
Correct Answer:
ABDE
ABDE
send
light_mode
delete
Question #43
A part of a project deals with the hardware work. As a project manager, you have decided to hire a company to deal with all hardware work on the project. Which type of risk response is this?
send
light_mode
delete
Question #44
Risks with low ratings of probability and impact are included on a ____ for future monitoring.
send
light_mode
delete
Question #45
Penetration testing (also called pen testing) is the practice of testing a computer system, network, or Web application to find vulnerabilities that an attacker could exploit. Which of the following areas can be exploited in a penetration test?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
- ASocial engineering
- BFile and directory permissions
- CBuffer overflows
- DKernel flaws
- ERace conditions
- FInformation system architectures
- GTrojan horses
Correct Answer:
ABCDEG
ABCDEG
send
light_mode
delete
Question #46
Frank is the project manager of the NHH Project. He is working with the project team to create a plan to document the procedures to manage risks throughout the project. This document will define how risks will be identified and quantified. It will also define how contingency plans will be implemented by the project team.
What document is Frank and the NHH Project team creating in this scenario?
What document is Frank and the NHH Project team creating in this scenario?
- AProject management plan
- BResource management plan
- CRisk management plan
- DProject plan
Correct Answer:
C
C
send
light_mode
delete
Question #47
In which of the following testing methodologies do assessors use all available documentation and work under no constraints, and attempt to circumvent the security features of an information system?
- AFull operational test
- BWalk-through test
- CPenetration test
- DPaper test
Correct Answer:
C
C
send
light_mode
delete
Question #48
Which of the following DITSCAP phases validates that the preceding work has produced an IS that operates in a specified computing environment?
send
light_mode
delete
Question #49
Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?
- ASafeguards
- BPreventive controls
- CDetective controls
- DCorrective controls
Correct Answer:
D
D
send
light_mode
delete
Question #50
Which of the following roles is also known as the accreditor?
- AChief Risk Officer
- BData owner
- CDesignated Approving Authority
- DChief Information Officer
Correct Answer:
C
C
send
light_mode
delete
All Pages