Ensurepass
2017 July ISC Official New Released CAP Q&As
100% Free Download! 100% Pass Guaranteed!
http://www.ensurepass.com/CAP.html

Certified Authorization Professional

QUESTION 221

Whichof the following are the types of access controls? Each correct answer represents a complete solution. Choose three.

 

A.

Administrative

B.

Automatic

C.

Technical

D.

Physical

 

Correct Answer: ACD

 

 

QUESTION 222

You are the project manager of the NNQ Project foryour company and are working you’re your project team to define contingency plans for the risks within your project. Mary, one of your project team members, asks what a contingency plan is. Which of the following statements best defines what a contingency response is?

 

A.

Some responses are designed for use only if certain events occur.

B.

Some responses have a cost and a time factor to consider for each risk event.

C.

Some responses must counteract pending risk events.

D.

Quantified risks should always have contingency responses.

 

Correct Answer: A

 

 

QUESTION 223

Who is responsible
for the stakeholder expectations management in a high-profile, high-risk project?

 

A.

Project management office

B.

Project sponsor

C.

Project risk assessment officer

D.

Project manager

 

Correct Answer: D

 

 

 

QUESTION 224

Which of the following requires all general support systems and major applications to be fully certified and accredited before these systems and applications are put into production? Each correct answer represents a part of the solution. Choose all that apply.

 

A.

NIST

B.

FIPS

C.

Office of Management and Budget (OMB)

D.

FISMA

 

Correct Answer: CD

 

 

QUESTION 225

Which of the following refers to a process that is used for implementing information security?

 

A.

Certification and Accreditation(C&A)

B.

Information Assurance (IA)

C.

Five Pillars model

D.

Classic information security model

 

Correct Answer: A

 

 

QUESTION 226

What project management plan is most likely to direct the quantitative risk analysis process for a project in a matrix environment?

 

A.

Staffing management plan

B.

Risk analysis plan

C.

Human resource management plan

D.

Risk management plan

 

Correct Answer: D

 

 

QUESTION 227

Your project team has identified a project risk that must be responded to. The risk has been recorded in the risk registerand the project team has been discussing potential risk responses for the risk event. The event is not likely to happen for several months but the probability of the event is high. Which one of the following is a valid response to the identified risk event?

 

A.

Corrective action

B.

Technical performance measurement

C.

Risk audit

D.

Earned value management

 

Correct Answer: A

 

 

 

 

 

QUESTION 228

Which of the following documents is described in the statement below?

 

“It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning.”

 

A.

Project charter

B.

Risk management plan

C.

Risk register

D.

Quality management plan

 

Correct Answer: C

 

 

QUESTION 229

Joan is a project management consultant and she has been hired by a firm to help them identify risk events within the project. Joan would first like to examine the project documents including the plans, assumptions lists, project files, and contracts. What key thing will help Joan to discover risks within the review of the project documents?

 

A.

The project documents will help the project manager, or Joan, to identify what risk identification approach is best to pursue.

B.

Plans that have loose definitions of terms and disconnected approaches will reveal risks.

C.

Poorly written requirements will reveal inconsistencies in the project plans and documents.

D.

Lack of consistency between the plans and the project requirements and assumptions can be the indicators of risk in the project.

 

Correct Answer: D

 

 

QUESTION 230

Which of the following statements about the availability concept of Information security management is true?

 

A.

It ensures that modifications are not made to data by unauthorized personnel or processes .

B.

It ensures reliable and timely access to resources.

C.

It determines actions and behaviors of a single individual within a system.

D.

It ensures that unauthorized modifications are not made to data by authorized personnel or processes.

 

Correct Answer: B

100% Free Download!
—Download Free Demo:CAP Demo PDF
100% Pass Guaranteed!
Download 2017 Ensurepass CAP Full Exam PDF and VCE Q&As:395
—Get 10% off your purchase! Copy it:TJDN-947R-9CCD [2017.07.01-2017.07.31]

Ensurepass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF + VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Ensurepass IT Certification PDF and VCE