Labour Day Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

ISC CAP CAP – Certified Authorization Professional Exam Practice Test

Note! Following CAP Exam is Retired now. Please select the alternative replacement for your Exam Certification.
Page: 1 / 40
Total 395 questions

CAP – Certified Authorization Professional Questions and Answers

Question 1

Which of the following DoD directives defines DITSCAP as the standard C&A process for the Department of Defense?

Options:

A.

DoD 8000.1

B.

DoD 5200.40

C.

DoD 5200.22-M

D.

DoD 8910.1

Question 2

Which of the following individuals makes the final accreditation decision?

Options:

A.

ISSE

B.

DAA

C.

CRO

D.

ISSO

Question 3

A high-profile, high-priority project within your organization is being created. Management wants you to pay special attention to the project risks and do all that you can to ensure that all of the risks are identified early in the project. Management has to ensure that this project succeeds.

Management's risk aversion in this project is associated with what term?

Options:

A.

Utility function

B.

Risk conscience

C.

Quantitativerisk analysis

D.

Risk mitigation

Question 4

Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

Options:

A.

Business continuity plan

B.

Continuity of Operations Plan

C.

Disaster recovery plan

D.

Contingency plan

Question 5

You are the project manager of the GHY project for your organization. You are about to start the qualitative risk analysis process for the project and you need to determine the roles and responsibilities for conducting risk management. Where can you find this information?

Options:

A.

Risk management plan

B.

Enterprise environmental factors

C.

Staffing management plan

D.

Risk register

Question 6

Which types of project tends to have more well-understood risks?

Options:

A.

State-of-art technologyprojects

B.

Recurrent projects

C.

Operational work projects

D.

First-of-its kind technology projects

Question 7

You work as a project manager for BlueWell Inc. You are working with your team members on the risk responses in the project. Which risk response will likely cause a project to use the procurement processes?

Options:

A.

Acceptance

B.

Mitigation

C.

Exploiting

D.

Sharing

Question 8

You work as a project manager for TechSoft Inc. You, the project team, and the key project stakeholders have completed a round of quantitative risk analysis. You now need to update the risk register with your findings so that you can communicate the risk results to the project stakeholders - including management. You will need to update all of the following information except for which one?

Options:

A.

Probability of achieving cost and time objectives

B.

Risk distributions within the project schedule

C.

Probabilistic analysis of the project

D.

Trends in quantitative risk analysis

Question 9

The Identify Risk process determines the risks that affect the project and document their characteristics. Why should the project team members be involved in the Identify Risk process?

Options:

A.

They are the individuals that will have the best responses for identified risks events within the project.

B.

They are the individuals that are most affected by the risk events.

C.

They are the individuals that will need a sense of ownership and responsibility for the risk e vents.

D.

They are the individuals that will most likely cause and respond to the risk events.

Question 10

The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. What are the different types of NIACAP accreditation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

System accreditation

B.

Type accreditation

C.

Site accreditation

D.

Secure accreditation

Question 11

You are the project manager of the HJK project for your organization. You and the project team have created risk responses for many of the risk events in the project. A teaming agreement is an example of what risk response?

Options:

A.

Acceptance

B.

Mitigation

C.

Sharing

D.

Transference

Question 12

Which of the following is NOT an objective of the security program?

Options:

A.

Security organization

B.

Security plan

C.

Security education

D.

Information classification

Question 13

Which of the following governance bodies directs and coordinates implementations of the information security program?

Options:

A.

Information Security Steering Committee

B.

Senior Management

C.

Business Unit Manager

D.

Chief Information Security Officer

Question 14

Joan is a project management consultant and she has been hired by a firm to help them identify risk events within the project. Joan would first like to examine the project documents including the plans, assumptions lists, project files, and contracts. What key thing will help Joan to discover risks within the review of the project documents?

Options:

A.

The project documents will help the project manager, or Joan, to identify what risk identification approach is best to pursue.

B.

Plans that have loose definitions of terms and disconnected approaches will reveal risks.

C.

Poorly written requirements will reveal inconsistencies in the project plans and documents.

D.

Lack of consistency between the plans and the project requirements and assumptions can be the indicators of risk in the project.

Question 15

Which of the following are the objectives of the security certification documentation task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

To prepare the Plan of Action and Milestones (POAM) based on the security assessment

B.

To provide the certification findings and recommendations to the information system owner

C.

To assemble the final security accreditation package and then submit it to the authorizing o fficial

D.

To update the system security plan based on the results of the security assessment

Question 16

Which of the following phases begins with a review of the SSAA in the DITSCAP accreditation?

Options:

A.

Phase 1

B.

Phase 4

C.

Phase 3

D.

Phase 2

Question 17

You are the program manager for your project. You are working with the project managers regarding the procurement processes for their projects. You have ruled out one particular contract type because it is considered too risky for the program. Which one of the following contract types is usually considered to be the most dangerous for the buyer?

Options:

A.

Cost plus incentive fee

B.

Time and materials

C.

Cost plus percentage of costs

D.

Fixed fee

Question 18

Which of the following components ensures that risks are examined for all new proposed change requests in the change control system?

Options:

A.

Risk monitoring and control

B.

Scope change control

C.

Configuration management

D.

Integrated change control

Question 19

You are the project manager of the GHY project for your organization. You are working with your project team to begin identifying risks for the project. As part of your preparation for identifying the risks within the project you will need eleven inputs for the process. Which one of the following is NOT an input to the risk identification process?

Options:

A.

Cost management plan

B.

Quality management plan

C.

Procurement management plan

D.

Stakeholder register

Question 20

Which of the following is NOT a phase of the security certification and accreditation process?

Options:

A.

Initiation

B.

Security certification

C.

Operation

D.

Maintenance

Question 21

Rob is the project manager of the IDLK Project for his company. This project has a budget of $5,600,000 and is expected to last 18 months. Rob has learned that a new law may affect how the project is allowed to proceed - even though the organization has already invested over $750,000 in the project. What risk response is the most appropriate for this instance?

Options:

A.

Transference

B.

Mitigation

C.

Enhance

D.

Acceptance

Question 22

Which of the following documents were developed by NIST for conducting Certification & Accreditation (C&A)?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

NIST Special Publication 800-53A

B.

NIST Special Publication 800-37A

C.

NIST Special Publication 800-59

D.

NIST Special Publication 800-53

E.

NIST Special Publication 800-37

F.

NIST Special Publication 800-60

Question 23

Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?

Options:

A.

SSAA

B.

FIPS

C.

FITSAF

D.

TCSEC

Question 24

Walter is the project manager of a large construction project. He'll be working with several vendors on the project. Vendors will be providing materials and labor for several parts of the project. Some of the works in the project are very dangerous so Walter has implemented safety requirements for all of the vendors and his own project team. Stakeholders for the project have added new requirements, which have caused new risks in the project. A vendor has identified a new risk that could affect the project if it comes into fruition. Walter agrees with the vendor and has updated the risk register and created potential risk responses to mitigate the risk. What should Walter also update in this scenario considering the risk event?

Options:

A.

Project management plan

B.

Project contractual relationship with the vendor

C.

Project communications plan

D.

Project scope statement

Question 25

Mary is the project manager for the BLB project. She has instructed the project team to assemble, to review the risks. She has included the schedule management plan as an input for the quantitative risk analysis process. Why is the schedule management plan needed for quantitative risk analysis?

Options:

A.

Mary will utilize the schedule controls and the nature of the schedule for the quantitative analysis of the schedule.

B.

Mary will schedule when the identified risks are likely to happen and affect the project schedule.

C.

Mary will utilize the schedule controls to determine how risks may be allowed to change the project schedule.

D.

Mary will use the schedule management plan to schedule the risk identification meetings throughout the remaining project.

Question 26

Which of the following is a standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system?

Options:

A.

FITSAF

B.

TCSEC

C.

FIPS

D.

SSAA

Question 27

Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation. Which of the following statements are true about Certification and Accreditation?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Certification is a comprehensive assessment of the management, operational, and technical security controls in an information system.

B.

Accreditation is a comprehensive assessment of the management, operational, and technical security controls in an information system.

C.

Certification isthe official management decision given by a senior agency official to authorize operation of an information system.

D.

Accreditation is the official management decision given by a senior agency official to authorize operation of an information system.

Question 28

You are the project manager of the GGG project. You have completed the risk identification process for the initial phases of your project. As you begin to document the risk events in the risk register what additional information can you associate with the identified risk events?

Options:

A.

Risk schedule

B.

Risk potential responses

C.

Risk cost

D.

Risk owner

Question 29

Fill in the blank with an appropriate word.

________ ensures that the information is not disclosed to unauthorized persons or processes.

Options:

A.

Confidentiality

Question 30

Harry is the project manager of the MMQ Construction Project. In this project Harry has identified a supplier who can create stained glass windows for 1,000 window units in the construction project. The supplier is an artist who works by himself, but creates windows for several companies throughout the United States. Management reviews the proposal to use this supplier and while they agree that the supplier is talented, they do not think the artist can fulfill the 1,000 window units in time for the project's deadline. Management asked Harry to find a supplier who will guarantee the completion of the windows by the needed date in the schedule. What risk response has management asked Harry to implement?

Options:

A.

Mitigation

B.

Acceptance

C.

Transference

D.

Avoidance

Question 31

In what portion of a project are risk and opportunities greatest and require intense planning and anticipation of risk events?

Options:

A.

Planning

B.

Executing

C.

Closing

D.

Initiating

Question 32

Which of the following statements is true about the continuous monitoring process?

Options:

A.

It takes place in the middle of system security accreditation.

B.

It takes place before and after system security accreditation.

C.

It takes place before the initial system security accreditation.

D.

It takes place after the initial system security accreditation.

Question 33

Which of the following individuals is responsible for the final accreditation decision?

Options:

A.

Information System Owner

B.

Certification Agent

C.

User Representative

D.

Risk Executive

Question 34

In 2003, NIST developed a new Certification & Accreditation (C&A) guideline known as FIPS 199.

What levels of potential impact are defined by FIPS 199?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Low

B.

Moderate

C.

High

D.

Medium

Question 35

Which of the following documents is used to provide a standard approach to the assessment of NIST SP 800-53 security controls?

Options:

A.

NIST SP 800-53A

B.

NIST SP 800-66

C.

NIST SP 800-41

D.

NIST SP 800-37

Question 36

Which of the following is used to indicate that the software has met a defined quality level and is ready for mass distribution either by electronic means or by physical media?

Options:

A.

DAA

B.

RTM

C.

ATM

D.

CRO

Question 37

Which of the following individuals is responsible for the final accreditation decision?

Options:

A.

Certification Agent

B.

User Representative

C.

Information System Owner

D.

Risk Executive

Question 38

Which of the following guidance documents is useful in determining the impact level of a particular threat on agency systems?

Options:

A.

NIST SP 800-41

B.

NIST SP 800-37

C.

FIPS 199

D.

NIST SP 800-14

Question 39

You are the project manager of the NHQ project for your company. Management has told you that you must implement an agreed upon contingency response if the Cost Performance Index in your project is less than 0.90. Consider that your project has a budget at completion of $250,000 and is 60 percent complete. You are scheduled to be however, 75 percent complete, and you have spent $165,000 to date. What is the Cost Performance Index for this project to determine if the contingency response should happen?

Options:

A.

0.88

B.

0.80

C.

-$37,500

D.

0.91

Question 40

You work as a project manager for BlueWell Inc. There has been a delay in your project work that is adversely affecting the project schedule. You decided, with your stakeholders' approval, to fast track the project work to get the project done faster. When you fast track the project which of the following are likely to increase?

Options:

A.

Risks

B.

Human resource needs

C.

Quality control concerns

D.

Costs

Question 41

Which of the following recovery plans includes a monitoring process and triggers for initiating planned actions?

Options:

A.

Business continuity plan

B.

Contingency plan

C.

Continuity of Operations Plan

D.

Disaster recovery plan

Question 42

Which of the following system security policies is used to address specific issues of concern to the organization?

Options:

A.

Program policy

B.

Issue-specific policy

C.

Informative policy

D.

System-specific policy

Question 43

Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

Options:

A.

Hackers

B.

Visitors

C.

Customers

D.

Employees

Question 44

Which of the following recovery plans includes a monitoring process and triggers for initiating planned actions?

Options:

A.

Contingency plan

B.

Business continuity plan

C.

Disaster recovery plan

D.

Continuity of Operations Plan

Question 45

For which of the following reporting requirements are continuous monitoring documentation reports used?

Options:

A.

FISMA

B.

NIST

C.

HIPAA

D.

FBI

Question 46

In which of the following testing methodologies do assessors use all available documentation and work under no constraints, and attempt to circumvent the security features of an information system?

Options:

A.

Full operational test

B.

Walk-through test

C.

Penetration test

D.

Paper test

Question 47

Certification and Accreditation (C&A or CnA) is a process for implementing information security.

Which of the following is the correct order of C&A phases in a DITSCAP assessment?

Options:

A.

Definition, Validation, Verification, and Post Accreditation

B.

Verification, Definition, Validation, and Post Accreditation

C.

Verification, Validation, Definition, and Post Accreditation

D.

Definition, Verification, Validation, and Post Accreditation

Question 48

Which of the following is a subset discipline of Corporate Governance focused on information security systems and their performance and risk management?

Options:

A.

Lanham Act

B.

ISG

C.

Clinger-Cohen Act

D.

Computer Misuse Act

Question 49

Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?

Options:

A.

FITSAF

B.

FIPS

C.

TCSEC

D.

SSAA

Question 50

Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation. Which of the following statements are true about Certification and Accreditation?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Accreditation is the official management decision given by a senior agency official to authorize operation of an information system.

B.

Accreditation is a comprehensive assessment of the management, operational, and technical security controls in an information system.

C.

Certification is the official management decision given by a senior agency official to authorize operation of an information system.

D.

Certification is a comprehensive assessment of the management, operational, and technical security controls in an information system.

Question 51

Jenny is the project manager of the NHJ Project for her company. She has identified several positive risk events within the project and she thinks these events can save the project time and money. You, a new team member wants to know that how many risk responses are available for a positive risk event. What will Jenny reply to you?

Options:

A.

Four

B.

Seven

C.

Acceptance is the only risk response for positive risk events.

D.

Three

Question 52

The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. What are the different types of NIACAP accreditation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Secure accreditation

B.

Type accreditation

C.

System accreditation

D.

Site accreditation

Question 53

Which of the following assessment methodologies defines a six-step technical security evaluation?

Options:

A.

FITSAF

B.

FIPS 102

C.

OCTAVE

D.

DITSCAP

Question 54

Gary is the project manager of his organization. He is managing a project that is similar to a project his organization completed recently. Gary has decided that he will use the information from the past project to help him and the project team to identify the risks that may be present in the project. Management agrees that this checklist approach is ideal and will save time in the project. Which of the following statement is most accurate about the limitations of the checklist analysis approach for Gary?

Options:

A.

The checklist analysis approach is fast but it is impossible to build and exhaustive checklist.

B.

The checklist analysis approach only uses qualitative analysis.

C.

The checklist analysis approach saves time, but can cost more.

D.

The checklist is also known as top down risk assessment

Question 55

Amy is the project manager for her company. In her current project the organization has a very low tolerance for risk events that will affect the project schedule. Management has asked Amy to consider the affect of all the risks on the project schedule. What approach can Amy take to create a bias against risks that will affect the schedule of the project?

Options:

A.

She can have the project team pad their time estimates to alleviate delays in the project schedule.

B.

She can create an overall project rating scheme to reflect the bias towards risks that affect the project schedule.

C.

She can filter all risks based on their affect on schedule versus other project objectives.

D.

She can shift risk-laden activities that affect the project schedule from the critical path as much as possible.

Question 56

What are the subordinate tasks of the Initiate and Plan IA C&A phase of the DIACAP process?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Develop DIACAP strategy.

B.

Assign IA controls.

C.

Assemble DIACAP team.

D.

Initiate IA implementation plan.

E.

Register system with DoD Component IA Program.

F.

Conduct validation activity.

Question 57

Gary is the project manager for his project. He and the project team have completed the qualitative risk analysis process and are about to enter the quantitative risk analysis process when Mary, the project sponsor, wants to know what quantitative risk analysis will review. Which of the following statements best defines what quantitative risk analysis will review?

Options:

A.

The quantitative risk analysis seeks to determine the true cost of each identified risk event and the probability of each risk event to determine the risk exposure.

B.

The quantitative risk analysis process will review risk events for their probability and impact on the project objectives.

C.

The quantitative risk analysis reviews the results of risk identification and prepares the project for risk response management.

D.

The quantitative risk analysis process will analyze the effect of risk events that may substantially impact the project's competing demands.

Question 58

You work as a project manager for BlueWell Inc. You are currently working with the project stakeholders to identify risks in your project. You understand that the qualitative risk assessment and analysis can reflect the attitude of the project team and other stakeholders to risk. Effective assessment of risk requires management of the risk attitudes of the participants. What should you, the project manager, do with assessment of identified risks in consideration of the attitude and bias of the participants towards the project risk?

Options:

A.

Document the bias for the risk events and communicate the bias with management

B.

Evaluate and document the bias towards the risk events

C.

Evaluate the bias through SWOT for true analysis of the risk events

D.

Evaluate the bias towards the risk events and correct the assessment accordingly

Question 59

Wendy is about to perform qualitative risk analysis on the identified risks within her project. Which one of the following will NOT help Wendy to perform this project management activity?

Options:

A.

Stakeholder register

B.

Risk register

C.

Project scope statement

D.

Risk management plan

Page: 1 / 40
Total 395 questions