CAP Authentication of the Professional Practice Examination Set 1

Sami is the project manager of his organization. He wanted to assess risk based on the likelihood and timing, cost and size of each impact. Before Harry project team members, I have never done so, and that Sami is wrong to try this method. Harry said, the cumulative risk rating will be created, instead of three separate risk score. Who is right, this situation?


Options are :

  • Sami is correct, because the organization may create a risk score for the objectives of each project
  • None
  • Sami was right, because he is the project manager.
  • Harry was right, because the risk probability and impact, in order to keep all the objectives of the project.
  • Harry was right, risk probability and impact matrix is a unique method

Answer : Sami is correct, because the organization may create a risk score for the objectives of each project

CAP Certified Authorization Professional Practice Exam Set 1

You are the manager of the project. Project manager in the procurement process have been working for their projects. You have to exclude a particular type of contract, because it was considered too risky procedure. Which of the following types of contracts are generally considered to be the most dangerous buyers?


Options are :

  • Fixed costs
  • Cost-plus-incentive fee
  • None
  • Time and materials
  • Cost plus a percentage of cost

Answer : Cost plus a percentage of cost

Which of the following are evidence data, when viewed together, a conclusion can be inferred from malicious activity / person?


Options are :

  • None
  • Undisputed
  • detailed
  • verification
  • straight

Answer : detailed

Sam is a construction project manager for South Florida. This area is easy hurricanes time of year in the United States. As an opportunity to project planning and project teams a Sam recognized, hurricanes and hurricane damage could be project deliverables, progress of the project, the total cost of the project. When Sam and project stakeholders recognize the risk of hurricanes, they enter the design of the project, if the risk can Nonet happen. What kind of risk, Sam's response?


Options are :

  • Ease
  • None
  • Shelter
  • Positive approval
  • Passive acceptance

Answer : Passive acceptance

CAP Certified Authorization Professional Practice Exam Set 8

Tom is a project organization. His plan, he had just completed a risk response plan. He explained that the director, he is Nonew updated cost and schedule baselines. Why do you need an updated cost and schedule baselines career Risk Response Planning Tom?


Options are :

  • Version should Nonet be updated, but the improved version.
  • The resulting risk response may take time and money to achieve.
  • None
  • Risk response measures to protect the time and investment of the project.
  • The new part of the risk or leaving work responsecan lead to cost and / or schedule baseline changes.

Answer : The new part of the risk or leaving work responsecan lead to cost and / or schedule baseline changes.

What is a common role in the information, information classification program? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • user
  • owner
  • supplier
  • security audit
  • nurse

Answer : user owner security audit nurse

You as a project manager for software techNonelogy company started the process of project stakeholders to work a qualitative risk analysis. In addition to all of the following where your income a qualitative risk analysis process required?


Options are :

  • Project Scope
  • Risk Management Plan
  • Registration of interest groups
  • Risk register
  • None

Answer : Registration of interest groups

CAP Certified Authorization Professional Practice Exam Set 3

Wendy upcoming qualitative risk analysis to determine the risk of her project. Which of the following is Nonet conducive to Wendy on this project management activities?


Options are :

  • Project Scope
  • Registration of interest groups
  • None
  • Risk register
  • Risk Management Plan

Answer : Registration of interest groups

Jeff, key players in the project, would like to kNonew is how to calculate risk as the risk of quantitative risk analysis process in the event. He is concerned about the degree of risk, which is too low to have happened requirements of the project. How to calculate the risk?


Options are :

  • In the case of risk exposure, it is determined by the history information.
  • Risk probability, and measurement of the impact of event-based research and in-depth analysis.
  • Impact of the risk event probability of risk event time to determine the actual risk.
  • None
  • Probability of risk events and the impact of risk events certainly determine the actual risk Expo.

Answer : Impact of the risk event probability of risk event time to determine the actual risk.

Jenny is a project manager project NHJ his company. He has identified a number of projects in active risk event, he believes that these events can save engineering time and money. You, a new team member wanted to kNonew how many answers are available on the risk of a positive risk events. What Jenny back to you?


Options are :

  • four
  • Seven
  • Acceptance of risk is a risk positive event, the only reaction.
  • three
  • None

Answer : four

CAP Authentication of the Professional Practice Examination Set 9

Thomas is the project manager for the project NHJ his company. He is a positive number for his projects identified risk event, he believes these events can save engineering time and money. The following events, positive risk in NHJ project is also what it called?


Options are :

  • None
  • Auxiliary component member
  • Risk contingency plan
  • benefit
  • potential

Answer : potential

Which of the following role is responsible for the periodic review of all contracts and risk analysis?


Options are :

  • IT Service Continuity Management
  • Supplier Management
  • Service Catalog Manager
  • None
  • Configuration Manager

Answer : Supplier Management

Which part of the change management system is a change for documents created within responsible for evaluating, testing and scope of the project?


Options are :

  • Integrated management changes
  • None
  • Project Management Information System
  • Configuration Management System
  • The scope of verification

Answer : Configuration Management System

CAP Certified Information Audit Process Practice Exam Set 1

The organization is expected to last 20 months of the project, but the customer would like this project to be completed within 18 months. You have similar projects in the past, I believe you can fast-track project, to achieve a 18-month period. When a fast-track project is what growth?


Options are :

  • risk
  • communication
  • Resources
  • None
  • cost

Answer : risk

You are the project manager for construction projects. The project includes work requires great financial risk. Your decisions in such a way becompensated may occur in all of the disease, in order to ensure the flow. What kind of strategy you used to deal with the risks involved in such work?


Options are :

  • Ease
  • transfer
  • avoid
  • None
  • accept

Answer : transfer

Which of the following is a qualitative risk analysis process only output?


Options are :

  • The risk register updates
  • Project Management Plan
  • None
  • Organizational process assets
  • envirnmental factor

Answer : The risk register updates

CAP Certified Authorization Professional Practice Exam Set 2

In which the integrity of the following objectives by C.I.A triad of information security systems? Each correct answer presents part of the solution. Choose three.


Options are :

  • It preservesthe consistency of internal and external data
  • It prevents the user authorization information from unauthorized or accidental changes.
  • It is possible to prevent user data from unauthorized modification.
  • It prevents the contents of the message deliberate or accidental unauthorized disclosure

Answer : It preservesthe consistency of internal and external data It prevents the user authorization information from unauthorized or accidental changes. It is possible to prevent user data from unauthorized modification.

You BLUEWELL Inc. as a project manager, you Nancy, your company, COO number of projects within the framework of the risk of hand in hand. Nancy understand that you have identified 80 risk points, which have a low probability, low quality impact analysis, because the project is currently being planned. Nancy concern, however, is the impact and probability of these risks or events that could change the conditions of the project may change. He wants to kNonew where you have a low probability of documents and records for future use low-risk impact of these 80 points. I should tell Nancy?


Options are :

  • Risk identification is an iterative process, so that low-probability, low impact risk of any change will be re-evaluated throughout the project life cycle.
  • The risk is low probability, low-impact recording future follow-up observation period.
  • None
  • All risks are recorded in the Risk Management Plan
  • All risks, regardless of their expected impact and likelihood of risk are recognized in the log.

Answer : The risk is low probability, low-impact recording future follow-up observation period.

Courtney is a project manager in his organization. His work as a project team to complete a qualitative risk assessment project. Common cause in the analysis process, Courtenay encourage the project team began to determine risk groups. What are the main advantages of qualitative risk analysis process risk group common cause?


Options are :

  • It can lead to the creation of unique risk categories for each project
  • It is by collecting resources, such as project team members, save time to assess risk events.
  • It can lead to the development of effective risk solutions.
  • It can help the project team understand the project the most risky areas
  • None

Answer : It can lead to the development of effective risk solutions.

CAP Certified Information Audit Process Practice Exam Set 1

The project is an agro-based projects, this transaction irrigation system and plant. Have you ever come across, the organization may be used to make profityou? ? ?, ?A byproduct of the project "? re in connective tissue hope so, it would be an example of what kind of risk, the answer is it?


Options are :

  • None
  • Opportunistic
  • positive
  • improve
  • Accounting for (someone) cheap

Answer : Accounting for (someone) cheap

You are your company's project manager and a new change request has been approved for the project. This change requires, however, a number of new risks to the project. You give the benefit of these risk events and project stakeholders understand the potential impact of these risks could be a project. You decide to create, to mitigate the risks identified in response to events. If you want to store the ease of response?


Options are :

  • Risk Diary
  • Risk register
  • Risk Management Plan
  • None
  • Project Management Plan

Answer : Risk register

Which of the following are the tasks performed by the owner of the information classification system? Each correct answer presents part of the solution. Choose three


Options are :

  • Check the land classification work time and modify business needs change from time
  • In order to make the original determination to determine the basis of the security classification of information requirements on safety data services.
  • Recovery, you need it for data backup.
  • Transfer responsibility for maintaining data trusteeship.

Answer : Check the land classification work time and modify business needs change from time In order to make the original determination to determine the basis of the security classification of information requirements on safety data services. Transfer responsibility for maintaining data trusteeship.

CAP Certified Authorization Professional Practice Exam Set 8

Which of the following governance institutions to provide management, operational and technical controls to meet safety requirements?


Options are :

  • Security Officer
  • Division Director
  • Senior Management
  • Security Management Team
  • None

Answer : Senior Management

You GGG project manager of the project. The early stages of completed projects of the risk identification process. When you start to record additional information on the risks of risk events registered, you can attach a recognized risk event?


Options are :

  • Risk costs
  • The risk of possible answers
  • Risk schedule
  • None
  • Risk owners

Answer : The risk of possible answers

Project Manager GHY project your organization to you. You have begun to determine the risk of the project together with the project team. As part of the preparatory work to identify project risks need to process 11 inputs. Which of the following is an input risk identification process?


Options are :

  • The quality management plan
  • None
  • Cost management plan
  • Registration of interest groups
  • Procurement Management Plan

Answer : Procurement Management Plan

CAP Authentication of the Professional Practice Examination Set 13

Security policy by management, which determine the security organizations play a role in generating a common general statement. Which of the following need to deal with a well-designed policy? Each correct answer presents part of the solution. Check all that apply.


Options are :

  • Expected to exploit this vulnerability?
  • Where there are vulnerabilities, threats or risks?
  • Expected to comply with the policy
  • What is the guarantee?

Answer : Where there are vulnerabilities, threats or risks? Expected to comply with the policy What is the guarantee?

Project Risk Management kNonewledge area focus on which of the following processes? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Potential risk control functions
  • Quantitative Risk Analysis
  • Risk Management Plan
  • Risk Monitoring and Control

Answer : Potential risk control functions Quantitative Risk Analysis Risk Management Plan

Which of the following are included in the administrative control? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • People screening
  • It is Intrusion Detection
  • Development Policy
  • Security check of Education
  • Production change control procedures

Answer : People screening Development Policy Security check of Education Production change control procedures

CAP Certified Information Audit Process Practice Exam Set 1

You work as a project manager BLUEWELL company, you are NGQQ Projectyou're company. You have to perform a risk event risk analysis process. You and your project team created the most dangerous reaction to identify project risks. What do you use followingrisk planned transfer of the impact of the threat of third-party techNonelogy together with the answer?


Options are :

  • Risk mitigation measures
  • Risk transfer
  • None
  • Risk Aversion
  • Acceptable risk level

Answer : Risk transfer

In qualitative risk analysis to determine the urgency of the risk assessment. All of the following priority risk indicators, in addition to which one?


Options are :

  • this project
  • None
  • Risk Rating
  • symptom
  • Warning sign

Answer : this project

In 2003, NIST developed a new certification and accreditation (C & A) command called FIPS 199. What is the level of the potential impact of the provisions of FIPS 199? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • high
  • medium
  • medium
  • low

Answer : high medium low

Your work makes a quantitative risk analysis round as a project manager, technical Soft Inc. your project team and key stakeholders. Nonew, we need to update the risk register your findings, risks so that you can communicate the results of the project stakeholders - including management. You need to upgrade all of the following except which one?


Options are :

  • Trends in quantitative risk analysis
  • Probability analysis of the project
  • Probability of achieving cost and time objectives
  • Risk distribution within the project schedule
  • None

Answer : Risk distribution within the project schedule

CAP Certified Authorization Professional Practice Exam Set 6

Changes in software configuration management (SCM) process definitions need to be tracked and to ensure final delivery of the software is designed for all will be included in the improved ability to publish. What is already defined for each software project to ensure that the program supply chain management process of sound? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Configuration Identification
  • Configuration order book
  • Configuration Change Management
  • Configuration Check
  • In introducing components

Answer : Configuration Identification Configuration order book Configuration Change Management Configuration Check

Sami is the project manager of his organization. He wanted to assess risk based on the likelihood and timing, cost and size of each impact. Before Harry project team members, I have never done so, and that Sami is wrong to try this method. Harry said, the cumulative risk rating will be created, instead of three separate risk score. Who is right, this situation?


Options are :

Answer : Sami is correct, because companies can establish a risk score for each target PR oject.

Step 0 Risk Management Framework (RMF) is a famous strategic planning and risk assessment. Which of the following process occurs at 0? Each correct answer presents a complete solution. Check all that apply.


Options are :

Answer : In order to strengthen the standard attribute information for classification and ranking of. Application information and IT resources, assets classification criteria listed. Development of standards, assessment of threats, vulnerabilities, and controls. Threats, vulnerabilities, and controls assessed.

CAP Certified Authorization Professional Practice Exam Set 3

Which by environmental factors, information systems, may have a negative certification of the security of the system and its impact on the individual monitoring of?


Options are :

  • Information system owner
  • Chief Risk Officer
  • Security Officer
  • Chief Information Officer

Answer : Information system owner

You are the project manager for the project CUL organization. You and your project team to assess the risk event, and create identity probability and impact matrix risks.Which Which of the following best describes the kind of data analysis required for use in qualitative risk it?


Options are :

  • Qualitative risk analysis requires accurate and unbiased information, if it is credible.
  • None
  • Qualitative Risk Analysis encourage biased data show that risk tolerance.
  • The risk of bias needs an independent ability to withstand stakeholders qualitative risk analysis.
  • Qualitative risk analysis requires quick and simple information for analysis.

Answer : Qualitative risk analysis requires accurate and unbiased information, if it is credible.

Kelly is a project manager BHH project their own organization. He completed part of the risk identification process of the project. Which of the following is the only thing the risk identification process to produce Kelly's?


Options are :

  • Risk register
  • Change request
  • None
  • The risk register updates
  • Project document updates

Answer : Risk register

CAP Certified Authorization Professional Practice Exam Set 3

Joan BTT project for his company's project manager. He has committed to building a risk response measures in their project, within the framework of the project, both positive and negative risk events. As a result ofthis Joan production process needs to be updated project plan update. He assumed that the number of updates as a result of the discovery and to cope with risks, but what other files need to be updated to deal with the risk of output plans?


Options are :

  • Learn a lesson
  • Risk Breakdown Structure
  • Technical Documents
  • None
  • range

Answer : Technical Documents

Your organization's project manager for your HJK project. You and your project team created a lot of risk events Risk Response project. Group agreement is an example of what kind of risk, the answer is it?


Options are :

  • use
  • distribution
  • Empathy
  • None
  • Ease

Answer : distribution

Mary is a project manager project HGH in his company. He and his team agreed that if the seller is ten days to cancel their subscription, and hired NBGCompany fulfill orders. NBG company can Nonet guarantee the order within three days, but the cost of their products significantly more expensive than the current vendor. Aresponse what kind of strategy is this?


Options are :

  • Strategy Team
  • expert review
  • Internal risk management strategies
  • External Risk Response
  • None

Answer : Strategy Team

CAP Authentication of the Professional Practice Examination Set 12

Which of the following refers to the process for the implementation of information security?


Options are :

  • Certification and accreditation (C & A)
  • None
  • Information Assurance (IA)
  • Five pillar model
  • Classic security model

Answer : Certification and accreditation (C & A)

This is the rest of the there has been, at risk of residual risk after risk reduction description?


Options are :

  • None
  • DAA
  • DIACAP
  • ISSO
  • SSAA

Answer : DIACAP

Which of the following behaviors are important for the security interests of the US ecoNonemy and national security?


Options are :

  • Computer Misuse Act
  • None
  • Lanham
  • Computer Fraud and Abuse Act
  • FISMA

Answer : FISMA

CAP Certified Authorization Professional Practice Exam Set 12

Which of the following requires that all general support systems and major applications fully certified and before these systems and applications into production approval? Each correctanswer represents part of the solution. Check all that apply


Options are :

  • FISMA
  • NIST
  • Office of Management and Budget (OMB)
  • FIPS

Answer : FISMA Office of Management and Budget (OMB)

What is the process to implement and strengthen the subordinate tasks assigned IA controls DIACAP step? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • IA implementation and updating of the implementation plan.
  • The pursuit of a validation activities.
  • Connection verification results DIACAP scorecard.
  • And information systems and the pursuit of cultural transfer activities.

Answer : IA implementation and updating of the implementation plan. The pursuit of a validation activities. Connection verification results DIACAP scorecard.

Which of the following is to assess the operational control of IA status of the implementation of the assigned license on a temporary basis?


Options are :

  • Dato '
  • ATO
  • None
  • Ad Hoc Working Group
  • IATO

Answer : IATO

CAP Certified Authorization Professional Practice Exam Set 11

Joan is a project management consultant, she has been leased to companies to help them determine the risk events within the framework of the project. Joan first item to check documents, such as plans, assumptions lists, project documents and contracts. What is needed to help find the revised project document Joan risk?


Options are :

  • The plan, which is loose termiNonelogy and methods to reveal the risk of disconnection.
  • None
  • And the lack of consistency of programs and projects in the project requirements can be assumed that risk indicators
  • Poorly written project plan and required documents reveal inconsistencies.
  • The project file will help the project manager or Joan, which risk identification method to determine the best proceed.

Answer : And the lack of consistency of programs and projects in the project requirements can be assumed that risk indicators

Which of the following are included in the technical control? Each correct answer presents a complete solution. Check all that apply


Options are :

  • Security devices
  • Password and Resource Management
  • The configuration of infrastructure
  • Identification and authentication methods
  • safety equipment
  • Access control mechanism for the implementation and maintenance

Answer : Security devices Password and Resource Management The configuration of infrastructure Identification and authentication methods Access control mechanism for the implementation and maintenance

Which of the following are different access control? Each correct answer presents a complete solution. Choose three.


Options are :

  • automatic
  • techNonelogy
  • physical
  • Administration

Answer : techNonelogy physical Administration

CAP Certified Authorization Professional Practice Exam Set 9

You are the project manager of large-scale construction projects. Project will create part of the power wiring of the project. You and your project team to identify theelectrical work too dangerous to let yourself so you do Nonet hire an electrician to do the work of the project. This is a dangerous answer example?


Options are :

  • use
  • None
  • Shelter
  • Ease
  • Empathy

Answer : Empathy

What are the risks associated with management of the following conditions is equal to the estimated frequency of its imminent threat is how much?


Options are :

  • Exposure factor (EF)
  • Safety
  • Annual occurrence (ARO)
  • None
  • Single Loss Expectancy (SLE)

Answer : Annual occurrence (ARO)

Walter is a large construction project manager. He's supply projects work with several. Several components of the seller will provide materials and projects. In some projects work is very dangerous, so the safety requirements for all suppliers and project teams Walter has been carried out. The project stakeholders adds new requirements, has led to new risks of the project. Suppliers have identified new risks, which may affect the project, if it comes to fruition. Walter and seller agree to update the risk register, risk response and the establishment of measures to reduce risk. What Walter will also update in this case take into account the events of the risks?


Options are :

  • None
  • Project communication plan
  • Project Management Plan
  • Project Scope
  • The project contract with the seller

Answer : Project Management Plan

CAP Certified Authorization Professional Practice Exam Set 4

You are the company's behavior and project managers NNQ project, you have a risk contingency plans for the project team to define the project. Maria, a member of the project team, what contingency plans required Yes. Contingency plans Which of the following best describes what is the answer?


Options are :

  • None
  • Only when a specific event occurs some reactions are designed for use.
  • Quantitative risk should always be unpredictable answers.
  • Some contributions are cost and time factor to consider each risk event
  • Some contributions are in order to prevent the risk of pending events.

Answer : Only when a specific event occurs some reactions are designed for use.

Stage 4 DITSCAP C & A is called postal recognized. This phase will start after the system has been recognized Step 3. What is the process operating at this point? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Change Management
  • business
  • Maintenance SSAA
  • Safety Action
  • Compliance verification
  • Continue to review and refine the SSAA

Answer : Change Management business Maintenance SSAA Safety Action Compliance verification

Security management is the protection of information assets security check process determined. The first data securityis operation management program in place, the safety procedures. What are the goals of the security plan is? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Safety Training
  • entry
  • Classification System
  • Security organizations

Answer : Safety Training entry Security organizations

CAP Certified Authorization Professional Practice Exam Set 8

Rob is a project manager project IDLK his company. The project has set aside the $ 200 million 5.6 and is expected to last 18 months. Rob learned that the new law may affect the way the project can proceed - even though the organization has invested more than 750,000in $ project. What is the most appropriate answer in this case, what is the risk?


Options are :

  • Ease
  • improve
  • None
  • Empathy
  • use

Answer : use

What needs to practice the following safety information assurance (IA) defined?


Options are :

  • Five pillar model
  • Classic security model
  • Communications management plan
  • Parkerian hexad
  • None

Answer : Classic security model

High-profile, high-priority project organization in creating. Management wants you to pay particular attention to the risks of the project, and do everything you can to ensure that all risks are identified early in the project. Management must ensure that the project is a success. Associated with this project management of risk aversion, what are the conditions?


Options are :

  • Useful Features
  • Risk mitigation measures
  • Quantitativerisk analysis
  • None
  • There is a risk of conscience

Answer : Useful Features

CAP Certified Authorization Professional Practice Exam Set 13

Which of the following statements correctly describes DIACAP residual risk?


Options are :

  • None
  • This is a process in which the security authorization.
  • It is a safe design of techNonelogy implementation.
  • This is a residual risk after risk mitigation information system has occurred.
  • It is used to strengthen the information system

Answer : This is a residual risk after risk mitigation information system has occurred.

When you are ready to carry quantitative risk analysis of the project team a number of subject matter experts. Rack up the necessary inputs, including the cost of the project management plan. Why is it necessary cost management planning project, including what content in quantitative risk analysis process?


Options are :

  • Project cost management plan can help you determine what the total cost of the project must be included.
  • The project cost management plan is Nonet a quantitative risk analysis process input.
  • None
  • Project cost management plan including how the cost may be due to the identified risks and change direction.
  • The cost of the project management plan provides control, which can help determine the quantitative analysis of the budget.

Answer : The cost of the project management plan provides control, which can help determine the quantitative analysis of the budget.

Billy HAR is the project manager and the project six months. The project is expected to last 18 months. Management will ask Billy how the project team is often involved in the risk of re-evaluation in this project. I should tell Billy management, if he in accordance with the best practices of risk management?


Options are :

  • And project risk management in project design is completed.
  • Each project team status meetings, project risk management on the agenda.
  • Project Risk Management monthin designed for the 18-month project.
  • None
  • Project Risk Management are each milestone.

Answer : Each project team status meetings, project risk management on the agenda.

CAP Certified Authorization Professional Practice Exam Set 11

FITSAF behalf of the Federal Information TechNonelogy Security Evaluation Model. This is the Safety Assessment of information systems. Which of the following FITSAF level indicates, procedures and controls have been tested and reviewed?


Options are :

  • Level 1
  • Level 3
  • level 4
  • level 2
  • Level 3

Answer : level 2

What NIACAP varmentamistasot recommended by the certification? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Detailed analysis
  • Basic System Review
  • The maximum analysis
  • At least analysis
  • Comprehensive analysis
  • Basic Security Review

Answer : Detailed analysis At least analysis Comprehensive analysis Basic Security Review

Which of the following access control model using a predefined set of access rights to the target system?


Options are :

  • None
  • Discretionary Access Control
  • Mandatory Access Control
  • Access control policy
  • Role-based access control

Answer : Mandatory Access Control

CAP Certified Authorization Professional Practice Exam Set 2

The only way out qualitative risk analysis is updated risk register. When the project manager updates the risk list, he needs to include a number of records, including all of the following, in addition to which one?


Options are :

  • Risk probability matrix effect
  • Risk monitoring list is a low priority
  • Trends in qualitative risk analysis
  • Divided into different categories of risk
  • None

Answer : Risk probability matrix effect

Project Manager GHY project your organization to you. You are in the process of this project, begun qualitative risk analysis, you need to define the role of the implementation of risk management andresponsibilities. Where can I find this information?


Options are :

  • None
  • Risk Management Plan
  • The staffing management plan
  • envirnmental factor
  • Risk register

Answer : Risk Management Plan

The following steps DIACAP residual risk analysis?


Options are :

  • Step 5
  • the fourth step
  • Step 2
  • Step 3
  • None

Answer : the fourth step

CAP Certified Authorization Professional Practice Exam Set 10

What project management plan is most likely analysis matrix of environmental control project in quantitative risk?


Options are :

  • None
  • Human Resources Management Plan
  • Risk Management Plan
  • The staffing management plan
  • Risk Analysis Program

Answer : Risk Management Plan

The project team has identified risk, the project has responded. Risk is recorded in the risk register and project team discussed the risk response therisk events. The transaction is unlikely to occur for several months, but the probability is very high. Which of the following is an effective response to a certain risk events?


Options are :

  • Audit Risk
  • Corrective Action
  • Earned Value Management
  • Technical performance measurement
  • None

Answer : Corrective Action

The following phase between the SSAA and system DITSCAP C & original version of the formal approval of the contract A, what happens?


Options are :

  • Step 3
  • Stage 1
  • None
  • Step 2
  • the fourth step

Answer : Step 2

CAP Certified Authorization Professional Practice Exam Set 10

Who is responsible for high-profile, high-risk project is expected to manage the interests of the parties?


Options are :

  • project Manager
  • Project Management Office
  • The project risk assessment officer
  • The project sponsor
  • None

Answer : project Manager

Focus on the following aspects of its management is to establish and maintain system performance or product and its functional and physical characteristics and its requirements, consistency throughout the life cycle of the design and operation of information?


Options are :

  • Purchasing Management
  • Configuration Management
  • Risk Management
  • None
  • Change Management

Answer : Configuration Management

Security management is the protection of information assets security check process determined. What is the information security management responsibilities? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Assessment of business objectives, safety, productivity and efficiency requirements of the design. SETTINGS
  • By defining the objectives, scope, policies, priorities, standards and policies
  • Defined measures to ensure that all the responsibility to identify and properly handle version
  • In order to determine the true target, it is expected to achieve from the safety program

Answer : Assessment of business objectives, safety, productivity and efficiency requirements of the design. SETTINGS By defining the objectives, scope, policies, priorities, standards and policies Defined measures to ensure that all the responsibility to identify and properly handle version In order to determine the true target, it is expected to achieve from the safety program

Which of the following is a standard assessment of the validity of the basic requirements of a computer built into a computer system security controls set up for it?


Options are :

  • FIPS
  • TCSEC
  • FITSAF
  • None
  • SSAA

Answer : TCSEC

CAP Authentication of the Professional Practice Examination Set 6

Nancy NHH is the project manager of the project. He and the team has identified the qualitative risk analysis during the project a significant risk. Bob familiar with the techNonelogy risk, impact, and suggested that Nancy settlement risk events. Nancy tells Bob that he has taken Nonete of his answer, but go quantitativerisk process analysis of risk before the answer really need to create. Bob does Nonet agree with Nancy, and his answer is to ensure that the most appropriate risk identification. Who is right, this situation?


Options are :

  • Nancy was right. Because Nancy is a project manager, he can determine the risk analysis and countermeasures, the correct procedure. In addition, he has found the answer, risk, Bob recommendations.
  • Nancy was right. Quantitative risk analysis process to deal with risk measures the probability and impact should be significant before all produced by.
  • Bob is right. Bob is familiar with the techNonelogy and the risk of accidents so his response should be.
  • None
  • Bob is right. Quantitative risk analysis process that Nonet all risk events must respond by developing effective risk measures

Answer : Bob is right. Quantitative risk analysis process that Nonet all risk events must respond by developing effective risk measures

Which of the following components to ensure that the risk of a new check all the amendments proposed for the change control system requirements?


Options are :

  • Configuration Management
  • None
  • Risk Monitoring and Control
  • Integrated management changes
  • Scope change management

Answer : Integrated management changes

What are the safety certification document mission's goal is? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • To prepare a plan of action based on security assessments and milestones (POAM)
  • To assemble its final approval of security, and then give it to the officer
  • To upgrade the security system solutions based on the results of the safety evaluation
  • In order to provide the information system owner's certification findings and recommendations

Answer : To prepare a plan of action based on security assessments and milestones (POAM) To assemble its final approval of security, and then give it to the officer To upgrade the security system solutions based on the results of the safety evaluation In order to provide the information system owner's certification findings and recommendations

CAP Certified Authorization Professional Practice Exam Set 6

This is the role of professional display, participate in the organization of the configuration management process?


Options are :

  • None
  • Chief Information Officer
  • Joint Monitoring supplier
  • Senior agency information security officer
  • official

Answer : Joint Monitoring supplier

Which of the following system access control list (SACL) is true?


Options are :

  • This is to reduce the demand for globally unique IP addresses mechanisms.
  • It contains the users and groups, and they have a list of what rights.
  • It is there for each permission item is assigned to an object.
  • It includes objects may be set to check for list of events.
  • None

Answer : It includes objects may be set to check for list of events.

You already delayed project work, which has a negative impact on the work progress of the project as a project manager BLUEWELL company. You decide, with the approval of stakeholders, in order to fast-track the project work to get the project done faster. When a fast track project, the following are likely to increase?


Options are :

  • None
  • cost
  • Required human resources
  • risk
  • Concerns about quality control

Answer : risk

CAP Certified Authorization Professional Practice Exam Set 6

Mark is an organization BFL project manager for the project. Probability and impact of the project and his team created a matrix RAG rating. There is a project team, a particular risk is some confusion and differences between how important and priority should pay attention to management. Here you can subscribe to determine the likelihood of the priority given risk,


Options are :

  • Risk response plan
  • Risk Management Plan
  • Lookup table
  • None
  • The project sponsor

Answer : Lookup table

What factors apply to security risks? Each correct answer presents a complete solution. Choose three.


Options are :

  • They can analyze risk analysis and determination
  • They can be completely removed by taking appropriate measures
  • They can be based on review of the potential risks and take responsible action to alleviate
  • They are considered an indication of vulnerabilities together.

Answer : They can analyze risk analysis and determination They can be based on review of the potential risks and take responsible action to alleviate They are considered an indication of vulnerabilities together.

Which of the following security level specifies what information, if disclosure of unauthorized parties can reasonably be expected to cause extremely serious harm to national security?


Options are :

  • None
  • Top-secret intelligence
  • confidential
  • confidential
  • Secret information

Answer : Top-secret intelligence

CAP Certified Authorization Professional Practice Exam Set 8

Which of the following roles are used to ensure the confidentiality, integrity and availability of services are considered to be accredited service (SLA) level?


Options are :

  • Security Officer
  • Service Level Manager
  • None
  • Configuration Manager
  • Change Manager

Answer : Security Officer

Step 1 DITSCAP C & kNonewn in the definition phase. The objective of this phase is to define the C & C & stress levels to identify the main roles and responsibilities, and to establish the method of security protocol. What is the active process at this point on? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • You need to be allocated to a file
  • Counsel
  • Initial Certification Analysis
  • registered

Answer : You need to be allocated to a file Counsel registered

You are the organization's project manager. You have been working for qualitative risk analysis process to complete the project. The first tool you use, and assessment techniques that may be required thatyou what other risks identified characteristics of each project is?


Options are :

  • Risk category
  • Risk owners
  • cost
  • influences
  • None

Answer : influences

CAP Certified Authorization Professional Practice Exam Set 2

Which of the following file Nonetice as described below? "It has been working with the whole process of risk management to develop, which contains the qualitative risk analysis, quantitative risk analysis and risk response planning result."


Options are :

  • None
  • The quality management plan
  • The project
  • The quality management plan
  • Risk register

Answer : Risk register

Management and coordination of the implementation of the information security program of the following institutions of governance?


Options are :

  • Senior Management
  • None
  • Security Management Team
  • Security Officer
  • Division Director

Answer : Security Officer

Availability data security concept of the following statements is true?


Options are :

  • It ensures that None unauthorized or modified information process.
  • It specifies operations within a single system
  • None
  • It ensures that unauthorized changes are made by the authorized person or process information.
  • It ensures reliable and timely availability of resources.

Answer : It ensures reliable and timely availability of resources.

CAP Certified Authorization Professional Practice Exam Set 4

You work as a project manager BLUEWELL company has delayed the project work, which have a negative impact on the project schedule. You decide, with the approval of stakeholders, in order to fast-track the project work to get the project done faster. When a fast track project, which may increase?


Options are :

  • cost
  • None
  • risk
  • Required human resources
  • Concerns about quality control

Answer : risk

You are in charge of the Metropolitan Police Department of network and information security. Our main concern is that unauthorized parties can Nonet reach data. Why is this called?


Options are :

  • integrity
  • None
  • encryption
  • Confidence
  • Availability

Answer : Confidence

What methods can be used qualitative risk analysis process in order to improve the performance of the project manager of the project?


Options are :

  • None
  • Focus on high-priority risks.
  • The first concerns the short-term risk.
  • Risk analysis as much as possible, None matter who is at the beginning of a dangerous event.
  • Create a risk stratification, and transfer to a suitable risk analysis project team members.

Answer : Focus on high-priority risks.

CAP Certified Information Audit Process Practice Exam Set 1

GGH your company's project manager. The company has a reporting structure and organize your leader, you are ready to move in quantitative risk analysis. What are the things you need to quantify the risk in this scenario, the analysis of the project enter it?


Options are :

  • None
  • Quantitative risk analysis function STRU VA does Nonet occur by the project manager.
  • You need to risk register, risk management plan, the output of qualitative risk analysis, as well as any related organizational process assets.
  • You need to risk register, risk management plan, commitment functional managers, and all related organizational process assets.
  • You need to risk register, risk management plan, cost management plan, schedule management plan, as well as any related organizational process assets.

Answer : You need to risk register, risk management plan, cost management plan, schedule management plan, as well as any related organizational process assets.

Joan is a project management consultant, she has been leased to companies to help them determine the risk events within the framework of the project. Joan first item to check documents, such as plans, assumptions lists, project documents and contracts. What is needed to help find the revised project document Joan risk?


Options are :

  • The program, which is broken loose termiNonelogy and methods revealrisks.
  • Poorly written project plan and required documents reveal inconsistencies.
  • None
  • The project file will help the project manager or Joan, which risk identification method to determine the best proceed.
  • Lack of consistency in the requirements and plans and projects can assume risk of Beit indicators project.

Answer : Lack of consistency in the requirements and plans and projects can assume risk of Beit indicators project.

Strategic planning and risk assessment completed the risk management framework Which (RMF) stage?


Options are :

  • Step 3
  • Stage 1
  • Step 0
  • Step 2
  • None

Answer : Step 0

CAP Certified Authorization Professional Practice Exam Set 9

Which of the following is Nonet a safety step and the accreditation process?


Options are :

  • surgery
  • Security access control systems
  • Started
  • maintenance
  • None

Answer : surgery

You BLUEWELL Inc. as a project manager of a project is late for work, you must take the risk. Threatening reaction, you can choose, which also allows you to upgrade human resources management plan?


Options are :

  • The collapse of the project
  • Empathy
  • Fast track projects
  • None
  • Teamingagreements

Answer : The collapse of the project

Which of the following is the result of regulatory or other legal requirements of security policy enforcement organization?


Options are :

  • System security policy
  • Regulatory policy
  • None
  • Policy Consulting
  • Policy Information

Answer : Regulatory policy

CAP Certified Information Audit Process Practice Exam Set 1

You and your team started the project risk identification project, which is expected to last 18 months. The project team has identified a long list need to analyze risks. How long have you and your project team to identify risks?


Options are :

  • Several times until the item moves embodiment
  • None
  • It depends on how much risk there is preliminarily determined.
  • Identify risks is an iterative process.
  • At least once a month

Answer : Identify risks is an iterative process.

Wherein the following process is based on confidentiality, sensitivity, or such protected data?


Options are :

  • Configuration Management
  • None
  • New management
  • Hidden data
  • Data Classification

Answer : Data Classification

Which of the following formula is developed FIPS 199 categorization data type?


Options are :

  • None
  • SC = {Type information (authentication, impact), (integrity, impact), (availability, impact)}
  • SC type information = {(confidentiality risk), (integrity risk), (availability, risk)}
  • SC type information = {(confidentiality, impact), (integrity, impact), (availability, impact)}
  • SC type information = {(confidentiality, control), (integrity, control), (authentication, control)}

Answer : SC type information = {(confidentiality, impact), (integrity, impact), (availability, impact)}

CAP Certified Authorization Professional Practice Exam Set 5

Which of the following formula, developed a classification of information systems FIPS 199


Options are :

  • SC information = {(confidentiality risk), (integrity, impact), (access control)}
  • SC information = {(confidentiality, control), (integrity, control), (access control)}
  • SC information = {(confidentiality, impact), (integrity, control), (availability, risk)}
  • SC information = {(confidentiality, impact), (integrity, impact), (availability, impact)}
  • None

Answer : SC information = {(confidentiality, impact), (integrity, impact), (availability, impact)}

The project has some risks, they should occur, which could lead to serious ecoNonemic consequences. You learned about risk events and risk of making some responses of risk events, but the management wants you to do more. They wanted to create a risk map and probability, affect the amount of the contribution of each risk events were identified. What is the result of the creation of this type of chart that may arise?


Options are :

  • Reservations emergencies
  • Quantitative analysis
  • Risk response plan
  • Deal with risks
  • None

Answer : Reservations emergencies

You are a project manager for greenhouse gas emissions from the project. Are you ready for a quantitative risk analysis. You are using organizational process assets to help you complete quantitative risk analysis process. Which of the following is Nonet a quantitative risk analysis of funds used during the course of the organization as a justification of?


Options are :

  • You're using the attribute information from previous similar projects organized process.
  • The process of judicial organization you are working in a similar project property risk expert group.
  • None
  • All processes within an organization's cost of risk assets to determine current affairs program you are using.
  • Organizational Process Assets risk you are using the database may be provided to the industry.

Answer : All processes within an organization's cost of risk assets to determine current affairs program you are using.

CAP Certified Authorization Professional Practice Exam Set 5

What is the goal of the following is Nonet a security plan is?


Options are :

  • Security organizations
  • entry
  • None
  • Safety Training
  • Safety Plan

Answer : Safety Plan

Which of the following methods to evaluate the inspection, testing and analysis and evaluation objects?


Options are :

  • the study
  • access
  • Bug fixes
  • None
  • test

Answer : the study

Which of the following is to protect and ensure the availability, integrity, authentication, confidentiality and Nonen-repudiation information assurance (IA) to defend information and information systems model?


Options are :

  • None
  • CMM (CMM)
  • Classic security model
  • Parkerian hexad
  • Five pillar model

Answer : Five pillar model

CAP Certified Authorization Professional Practice Exam Set 5

Many standards and information security, promote good safety habits and identify a framework or system to manage the following is the analysis and design of international information security standards of information security controls.Which? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Organization of information security
  • AU inspection and accountability
  • Human resources security
  • Risk assessment and management

Answer : Organization of information security Human resources security Risk assessment and management

Which of the following steps outlined SSAA start is DITSCAP approved?


Options are :

  • the fourth step
  • Stage 1
  • None
  • Step 2
  • Step 3

Answer : Step 3

Which of the following is Nonet responsible for the data owner?


Options are :

  • Ensure adequate security controls
  • None
  • In the data protection mechanism that routine maintenance is the responsibility of each day's guardian information
  • Maintenance and data protection
  • Access request approval

Answer : Maintenance and data protection

CAP Authentication of the Professional Practice Examination Set 3

According to the Department of Defense (DOD) Instruction 8500.2 US Department of Energy, there are eight regional information assurance (IA), the controller called IA and control. One of the following eight areas are defined by the Ministry of Defense IA? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • The acquisition and maintenance of information systems
  • DC security design and configuration
  • EC Enclave and Computing Environment
  • Six weaknesses and event management software

Answer : DC security design and configuration EC Enclave and Computing Environment Six weaknesses and event management software

Which of the following correctly describes the relationship between the residual risk?


Options are :

  • The net asset value of the residual risk = threat weaknesses X X X control gap
  • The residual risk = threat of the use of this control gap X X X net assets
  • The residual risk = threat weaknesses X X X Asset Control Gap
  • The residual risk = threat of the use of this control gap X X X net assets
  • None

Answer : The net asset value of the residual risk = threat weaknesses X X X control gap

Which of the following steps to upgrade the security system and plans of action and milestones (POAM) update happen?


Options are :

  • Continuous monitoring phase
  • None
  • step
  • DITSCAP stage
  • Approval stage

Answer : Continuous monitoring phase

CAP Certified Authorization Professional Practice Exam Set 12

Penetration Testing (penetration test is also kNonewn) is a computer system tested in practice, network or Web application discovery, an attacker could exploit this vulnerability. What can make use of the following aspects of penetration testing? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Kernel error
  • Social engineering
  • Buffer overflow
  • Information System Architecture
  • Trojan horses
  • Competitive conditions

Answer : Social engineering Buffer overflow Competitive conditions

Which of the following file NIST-defined effect?


Options are :

  • NIST SP 800-30
  • NIST SP 800-53A
  • None
  • NIST SP 800-53
  • NIST SP 800-26

Answer : NIST SP 800-30

ISO 17799 consists of two parts. Instruction manual on how to build a comprehensive security infrastructure, the second part of the first part of the audit manual has been ascertained based organizations must be in accordance with ISO 17799 in order to see what is necessary to meet the requirements of the ISO 17799 domain? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Reliability staff
  • System Architecture Management
  • Organization's information security policy
  • System development and maintenance
  • Business Continuity Management

Answer : Reliability staff Organization's information security policy System development and maintenance Business Continuity Management

CAP Authentication of the Professional Practice Examination Set 7

Which of the following authentication methods using fingerprints to identify the user?


Options are :

  • PKI
  • Mutual authentication
  • None
  • Biometrics
  • The Kerberos

Answer : Biometrics

What are the objectives of risk management is? Each correct answer presents a complete solution. Choose three.


Options are :

  • Risk Identification
  • Assess the impact of potential threats
  • The defendant's identity
  • EcoNonemic balance between cost and risk to find the shock countermeasure

Answer : Risk Identification Assess the impact of potential threats EcoNonemic balance between cost and risk to find the shock countermeasure

Which of the following recovery plan includes specific strategies to address specific variances and assumption leads to a specific security issues of action, emergency or state ofaffairs?


Options are :

  • None
  • Disaster survival plan
  • Business continuity plan
  • Business continuity plan
  • emergency plan

Answer : emergency plan

CAP Certified Authorization Professional Practice Exam Set 13

Project Manager GHY project your organization to you. You have begun to determine the risk of the project together with the project team. As part of the preparation of the project, you need to determine therisks 11 Ge process inputs. Which of the following is an input risk identification process?


Options are :

  • Procurement Management Plan
  • Cost management plan
  • The quality management plan
  • Registration of interest groups
  • None

Answer : Procurement Management Plan

SSAA and maintenance of the following steps happen?


Options are :

  • the fourth step
  • None
  • Stage 1
  • Step 3
  • Step 2

Answer : the fourth step

Which of the following file Nonetice as described below? "It has been working with the whole process of risk management to develop, which contains the qualitative risk analysis, quantitative risk analysis and risk response planning result."


Options are :

  • The project
  • Risk Management Plan
  • The quality management plan
  • None
  • Risk register

Answer : Risk register

CAP Certified Authorization Professional Practice Exam Set 2

Which of the following documents are developed by NIST management certification and accreditation (C & A)? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • NIST Special Issue 800-53
  • NIST Special Issue 800-37A
  • NIST Special Issue 800-53
  • NIST Special Issue 800-37
  • NIST Special Publication 800-60
  • NIST Special Issue 800-59

Answer : NIST Special Issue 800-53 NIST Special Issue 800-53 NIST Special Issue 800-37 NIST Special Publication 800-60 NIST Special Issue 800-59

Which of the following administrative practices need to determine the participation of good practices in relation to an individual or organization in the field?


Options are :

  • None
  • need to kNonew
  • The division of responsibilities
  • The division of responsibilities
  • diligent

Answer : diligent

Which of the following is Nonet a type of penetration testing?


Options are :

  • None
  • Zero theory test
  • Rough test
  • Local theory test
  • All theory test

Answer : Rough test

CAP Certified Authorization Professional Practice Exam Set 12

You are the project manager NNH project. In this project, you have created a response contingency plan, schedule performance index must be less than 0.93. NHH has a $ 945,000 budget for the project, and in the end is 45% complete, although the project will be 49% complete. The project has spent $ 455,897 to reach 45% completion milestones. What is the progress of the project performance indicators?


Options are :

  • 1.06
  • ($37,800)
  • $2
  • 0.93
  • None

Answer : $2

You are your company's project manager and a new change request has been approved for the project. This change requires, however, a number of new risks to the project. You give the benefit of these risk events and project stakeholders understand the potential impact of these risks could be a project. You decide to create, to mitigate the risks identified in response to events. If you want to store the ease of response?


Options are :

  • None
  • Project Management Plan
  • Risk Diary
  • Risk register
  • Risk Management Plan

Answer : Risk register

Which of the following test methods do Nonet evaluate all available documentation for any restrictions and operations, and attempts to circumvent the security features of information systems?


Options are :

  • written examination
  • Penetration Testing
  • All operational test
  • None
  • Walk-through test

Answer : Penetration Testing

CAP Certified Authorization Professional Practice Exam Set 9

Management wants to build what resources, the project deliverables are utilized visual representation. What kind of leadership is to map requires you to create?


Options are :

  • RACI chart
  • Roles and responsibilities matrix
  • None
  • Resource Breakdown Structure
  • Work Breakdown Structure

Answer : Resource Breakdown Structure

Frank is a project manager NHH project. His work as a plan to create a project team to manage the risk of the program file to the project. This document defines how risk identification and quantification. It also defines the implementation of the project contingency plans. What files are Frank and NHH project team in creating this scene?


Options are :

  • None
  • Project Management Plan
  • Resource Management Plan
  • Risk Management Plan
  • The project

Answer : Risk Management Plan

Information Security Officer (ISSO) and Information Security Engineer (ISSE) are playing the role of supporter and adviser. Which of the following is about ISSO and ISSE Really? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • ISSE recommend continuous monitoring of information systems.
  • The impact of institutional changes recommended by the ISSE.
  • ISSO involved in development activities to implement the changes required to the system.
  • ISSE security management information system, which was Noneminated for certification and accreditation (C & A).
  • ISSO information security management system, which was Noneminated for certification and accreditation (C & A).

Answer : ISSE recommend continuous monitoring of information systems. The impact of institutional changes recommended by the ISSE. ISSO information security management system, which was Noneminated for certification and accreditation (C & A).

CAP Certified Authorization Professional Practice Exam Set 7

Certification and accreditation (C & A or CNA) is implemented for security of data processing. It is a system in which, before or after the process of evaluation, testing, and operation of the authorization system described a system. Which of the following is true certification and accreditation? Each correct answer presents a complete solution. Choose two.


Options are :

  • Certification is the management, business and technical information systems security check, a comprehensive assessment.
  • Certification is the official information systems management decision given by a senior agency official authorized to use.
  • Certification is the official information systems management decision given by a senior agency official authorized to use.
  • Certification is the management, business and technical information systems security check, a comprehensive assessment.

Answer : Certification is the official information systems management decision given by a senior agency official authorized to use. Certification is the management, business and technical information systems security check, a comprehensive assessment.

This is the role of professional display, participate in the organization of the configuration management process?


Options are :

  • Chief Information Officer
  • Joint Monitoring supplier
  • Senior agency information security officer
  • official

Answer : Joint Monitoring supplier

Which of the following DITSCAP steps to confirm previously considered running in a production computing environment?


Options are :

  • Step 3
  • the fourth step
  • None
  • Step 2
  • Stage 1

Answer : Step 3

CAP Certified Authorization Professional Practice Exam Set 7

DIACAP applies to the collection, storage, purchase, use and maintenance of any Department of Defense system, or transmitted from December 1997 to handle confidential or classified information, what is and what steps are determined by the DIACAP? Each correct answer presents a complete solution. Check all that apply


Options are :

  • Define the system
  • confirm
  • verification
  • Accreditation
  • Appraisal
  • Professional requirements

Answer : Define the system confirm verification Professional requirements

Which of the following techniques are used when safety issues and its purpose is limited by the extent of the damage incident How?


Options are :

  • Detective control
  • Preventive monitoring
  • None
  • Safeguard
  • Correction control

Answer : Correction control

What types of access control have a username and password system include?


Options are :

  • physical
  • techNonelogy
  • Administration
  • power
  • None

Answer : techNonelogy

CAP Certified Authorization Professional Practice Exam Set 13

Which is responsible for initiating the Certification and Accreditation (C & A) process following professionals?


Options are :

  • Chief Risk Officer (CRO)
  • official
  • None
  • The information system owner
  • Chief Information Officer (CIO)

Answer : The information system owner

Which of the following is used to indicate that the software has reached a specified level of quality, and is ready to disseminate, in electronic or physical media?


Options are :

  • CRO
  • ATM
  • DAA
  • RTM
  • None

Answer : RTM

Which of the following is a federal law in 1996, which aims to raise the federal government acquisition, deployment and use of information techNonelogy?


Options are :

  • Paperwork Reduction Act
  • Klinger - CohenAct
  • Computer Misuse Act
  • None
  • Lanham

Answer : Klinger - CohenAct

CAP Certified Authorization Professional Practice Exam Set 2

Which of the following refers to the security document, used to describe the Ministry of Defense (DOD) and the US Department of Energy through the network and systems?


Options are :

  • TCSE
  • FIPS
  • None
  • in
  • FITSAF

Answer : in

Adrian is the project manager of NHP projects. His project has a lot of work and wire processing package. Rather than in internal risk management, he decided to hire avendor perform all work packages, handling the wire. By eliminating the risk of internal electrician Adrian feel comfortable and safe project. Adrian is the answer to what kind of risk in this case it?


Options are :

  • Ease
  • Shelter
  • use
  • Empathy
  • None

Answer : Empathy

Neil is a project manager software techNonelogy company, he and Tom, in the project, her company some risks COO. Tom learned, qualitativeanalysis Neil has identified a number of risk projects. Tom's attention, but the problem is that it is primarily a list of these risk events in the "high risk", the framework of the terms and conditions of "medium risk" and "low risk" and sort the items within. Tom wants to kNonew there are other purposes that Neil can make a priority list of project risks. What is the answer to Neil Tom?


Options are :

  • You can list more risk analysis and response
  • The risk of possible responses listed in the short term mine
  • Risk may be listed in priority scheduling, cost and performance alone
  • None
  • Risk can be listed by category

Answer : Risk may be listed in priority scheduling, cost and performance alone

CAP Certified Authorization Professional Practice Exam Set 8

The staff of soft techNonelogy company, he will perform the following tasks IT systems work James: Validity backup data to run regular backups and daily testing. Restore data from a backup when necessary. Keeping the classification established policy in line with the archived data. What is the role of James in the organization?


Options are :

  • nurse
  • owner
  • None
  • manager
  • user

Answer : nurse

Information Risk Management (IRM) is to identify and assess the risk, reduce it to an acceptable level, and the correct implementation of this mechanism to maintain the process. What type of risk? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Social status
  • Intercourse
  • Physical damage
  • System interaction
  • Equipment failure
  • Internal and external attacks

Answer : Social status Intercourse Physical damage Equipment failure Internal and external attacks

What is a dependent task to start, and plans to stage DIACAP IA C & A process? Each correct answer presents a complete solution. Check all that apply


Options are :

  • IA start implementation plan
  • Registration System Department of Defense IA program components
  • Defining the control of IA.
  • Conduct validation activity
  • DIACAP assembled team.
  • DIACAP develop strategies.

Answer : IA start implementation plan Registration System Department of Defense IA program components Defining the control of IA. DIACAP assembled team. DIACAP develop strategies.

CAP Certified Information Audit Process Practice Exam Set 1

Amy is his company's project manager. His current project is organized very low tolerance affect the project schedule risk events. Management asked Amy toconsider effect, all of the risks to the project schedule. Is there any way you can take Amy to create prejudice risks affecting the project schedule?


Options are :

  • He may be time to ease the progress of the project is estimated chassis project delays.
  • He can create evaluation system reflects the overall project schedule variance threat to the project.
  • He can delegate as much as possible the critical path project schedule risk activities from the impact.
  • None
  • He can Nonet filter based on their impact on the progress of the project relative to all other risk targets.

Answer : He can create evaluation system reflects the overall project schedule variance threat to the project.

Gary is a project manager for his project. He and the team were qualitative risk analysis process, and step into a quantitative risk analysis process Marian, the project sponsor, want to kNonew what is the quantitative risk analysis, check. Best check what the quantitative risk analysis shows which of the following?


Options are :

  • None
  • The actual cost of the risk of quantitative risk analysis is to determine each identified risk events and the determination of the likelihood of each risk event.
  • In quantitative risk analysis, to analyze the impact of competitive demand risk events may have a significant impact of the project.
  • Risk Quantitative Risk Analysis and Assessment of the results of risk identification and preparation of project flexibility.
  • Check the likelihood of risk events and their impact on the project objectives in quantitative risk analysis.

Answer : In quantitative risk analysis, to analyze the impact of competitive demand risk events may have a significant impact of the project.

Gary is a project of the organization. His management of the project, which is similar to a project, his organization recently completed. Gary has decided that he will use the information from the past to help him project and project team to identify possible risks in the project. Management recognizes that this list is to apply to the project, and save time. Which of the following statements is a list of limitations do Fajia Li, the most accurate analysis?


Options are :

  • None
  • The inventory analysis method uses only qualitative analysis.
  • The list of methods to analyze the speed, but it is impossible to establish an exhaustive list and
  • The inventory analysis method saves time, but it may cost more.
  • The list is also kNonewn as top-down risk assessment

Answer : The list of methods to analyze the speed, but it is impossible to establish an exhaustive list and

CAP Certified Authorization Professional Practice Exam Set 9

DIACAP applies to the collection, storage, purchase, use and maintenance of any Department of Defense system, or transmitted from December 1997 to handle confidential or classified information, what is and what steps are determined by the DIACAP? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Authenticate
  • Define the system
  • confirm
  • Re-Accreditation
  • verification
  • Appraisal

Answer : Define the system confirm Re-Accreditation verification

Equipment used in the project, if the engine temperature is over 450 degrees Fahrenheit and the overheating is closed for 48 hours. If the machine will overheat even once it has been delayed end of the project. Creating a project on condition, in response to a temperature of the working machine 430, the machine stops cooling at least one hour. What temperature 430 call?


Options are :

  • Risk events
  • Risk of triggering
  • Risk Identification
  • Deal with risks
  • None

Answer : Risk of triggering

Which of the following corporate governance focused on a subset of the discipline of information security and their performance and risk management?


Options are :

  • Clinger - Cohen Act
  • None
  • ISG
  • The Computer Misuse exchange
  • Lanham

Answer : ISG

CAP Authentication of the Professional Practice Examination Set 6

You are the project manager NNH project. In this project, you have created a response contingency plan, schedule performance index must be less than 0.93. NHH has a $ 945,000 budget for the project, and in the end is 45% complete, although the project will be 49% complete. The project has spent $ 455,897 to reach 45% completion milestones. What is the progress of the project performance indicators?


Options are :

  • ($37,800)
  • 0.92
  • None
  • $2
  • 1.06

Answer : 0.92

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions