Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! CAP has been withdrawn.

CAP Practice Exam Questions with Answers CAP - Certified Authorization Professional Certification

Question # 6

Which of the following are the types of access controls?

Each correct answer represents a complete solution. Choose three.

A.

Administrative

B.

Automatic

C.

Technical

D.

Physical

Full Access
Question # 7

You work as a project manager for BlueWell Inc. You are working on a project and the management wants a rapid and cost-effective means for establishing priorities for planning risk responses in your project. Which risk management process can satisfy management's objective for your project?

A.

Qualitative risk analysis

B.

Quantitative analysis

C.

Historical information

D.

Rolling wave planning

Full Access
Question # 8

NIST SP 800-53A defines three types of interview depending on the level of assessment conducted. Which of the following NIST SP 800-53A interviews consists of informal and ad hoc interviews?

A.

Substantial

B.

Significant

C.

Abbreviated

D.

Comprehensive

Full Access
Question # 9

Which of the following assessment methods involves observing or conducting the operation of physical devices?

A.

Interview

B.

Deviation

C.

Examination

D.

Testing

Full Access
Question # 10

The Phase 1 of DITSCAP C&A is known as Definition Phase. The goal of this phase is to define the C&A level of effort, identify the main C&A roles and responsibilities, and create an agreement on the method for implementing the security requirements. What are the process activities of this phase?

Each correct answer represents a complete solution. Choose all that apply.

A.

Registration

B.

Document mission need

C.

Negotiation

D.

Initial Certification Analysis

Full Access
Question # 11

Information Security management is a process of defining the security controls in order to protect information assets. What are the security management responsibilities?

Each correct answer represents a complete solution. Choose all that apply.

A.

Evaluating business objectives, security risks, user productivity, and functionality requirem ents

B.

Determining actual goals that are expected to be accomplished from a security program

C.

Defining steps to ensure that all the responsibilities are accounted for and properly address ed

D.

Determining objectives, scope, policies, priorities, standards, and strategies

Full Access
Question # 12

Which of the following NIST Special Publication documents provides a guideline on questionnaires and checklists through which systems can be evaluated for compliance against specific control objectives?

A.

NIST SP 800-53A

B.

NIST SP 800-26

C.

NIST SP 800-53

D.

NIST SP 800-59

E.

NIST SP 800-60

F.

NIST SP 800-37

Full Access
Question # 13

Which of the following tasks are identified by the Plan of Action and Milestones document?

Each correct answer represents a complete solution. Choose all that apply.

A.

The plans that need to be implemented

B.

The resources needed to accomplish the elements of the plan

C.

Any milestones that are needed in meeting the tasks

D.

The tasks that are required to be accomplished

E.

Scheduled completion dates for the milestones

Full Access
Question # 14

The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the role of a supporter and advisor, respectively. Which of the following statements are true about ISSO and ISSE?

Each correct answer represents a complete solution. Choose all that apply.

A.

An ISSO manages the security of the information system that is slated for Certification &Accreditation (C&A).

B.

An ISSE manages the security of the information system that is slated for Certification & Accreditation (C&A).

C.

An ISSE provides advice on the continuous monitoring of the information system.

D.

An ISSO takes part in the development activities that are required to implement system ch anges.

E.

An ISSE provides advice on the impacts of system changes.

Full Access
Question # 15

You work as a project manager for TechSoft Inc. You, the project team, and the key project stakeholders have completed a round of quantitative risk analysis. You now need to update the risk register with your findings so that you can communicate the risk results to the project stakeholders - including management. You will need to update all of the following information except for which one?

A.

Probability of achieving cost and time objectives

B.

Risk distributions within the project schedule

C.

Probabilistic analysis of the project

D.

Trends in quantitative risk analysis

Full Access
Question # 16

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

A.

Safeguard

B.

Single Loss Expectancy (SLE)

C.

Exposure Factor (EF)

D.

Annualized Rate of Occurrence (ARO)

Full Access
Question # 17

What project management plan is most likely to direct the quantitative risk analysis process for a project in a matrix environment?

A.

Staffing management plan

B.

Risk analysis plan

C.

Human resource management plan

D.

Risk management plan

Full Access
Question # 18

Harry is a project manager of a software development project. In the early stages of planning, he and the stakeholders operated with the belief that the software they were developing would work with their organization's current computer operating system. Now that the project team has started developing the software it has become apparent that the software will not work with nearly half of the organization's computer operating systems. The incorrect belief Harry had in the software compatibility is an example of what in project management?

A.

Issue

B.

Risk

C.

Constraint

D.

Assumption

Full Access
Question # 19

Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?

A.

SSAA

B.

FIPS

C.

FITSAF

D.

TCSEC

Full Access
Question # 20

Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

A.

Continuity of Operations Plan

B.

Disaster recovery plan

C.

Contingency plan

D.

Business continuity plan

Full Access
Question # 21

Which of the following is an Information Assurance (IA) model that protects and defends information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation?

A.

Parkerian Hexad

B.

Capability Maturity Model (CMM)

C.

Classic information security model

D.

Five Pillars model

Full Access
Question # 22

In which of the following phases do the system security plan update and the Plan of Action and Milestones (POAM) update take place?

A.

Continuous Monitoring Phase

B.

Accreditation Phase

C.

Preparation Phase

D.

DITSCAP Phase

Full Access
Question # 23

Gary is the project manager for his project. He and the project team have completed the qualitative risk analysis process and are about to enter the quantitative risk analysis process when Mary, the project sponsor, wants to know what quantitative risk analysis will review. Which of the following statements best defines what quantitative risk analysis will review?

A.

The quantitative risk analysis process will analyze the effect of risk events that may substantially impact the project's competing demands.

B.

The quantitative risk analysis reviews the results of risk identification and prepares the project for risk response management.

C.

The quantitative risk analysis process will review risk events for their probability and impact on the project objectives.

D.

The quantitative risk analysis seeks to determine the true cost of each identified risk event and the probability of each risk event to determine the risk exposure.

Full Access
Question # 24

Walter is the project manager of a large construction project. He'll be working with several vendors on the project. Vendors will be providing materials and labor for several parts of the project. Some of the works in the project are very dangerous so Walter has implemented safety requirements for all of the vendors and his own project team. Stakeholders for the project have added new requirements, which have caused new risks in the project. A vendor has identified a new risk that could affect the project if it comes into fruition. Walter agrees with the vendor and has updated the risk register and created potential risk responses to mitigate the risk. What should Walter also update in this scenario considering the risk event?

A.

Project management plan

B.

Project contractual relationship with the vendor

C.

Project communications plan

D.

Project scope statement

Full Access
Question # 25

You work as the project manager for Bluewell Inc. There has been a delay in your project work that is adversely affecting the project schedule. You decide, with your stakeholders' approval, to fast track the project work to get the project done faster. When you fast track the project, what is likely to increase?

A.

Human resource needs

B.

Risks

C.

Costs

D.

Quality control concerns

Full Access
Question # 26

Which of the following documents were developed by NIST for conducting Certification & Accreditation (C&A)?

Each correct answer represents a complete solution. Choose all that apply.

A.

NIST Special Publication 800-53A

B.

NIST Special Publication 800-37A

C.

NIST Special Publication 800-59

D.

NIST Special Publication 800-53

E.

NIST Special Publication 800-37

F.

NIST Special Publication 800-60

Full Access
Question # 27

Which of the following NIST documents defines impact?

A.

NIST SP 800-53

B.

NIST SP 800-26

C.

NIST SP 800-30

D.

NIST SP 800-53A

Full Access
Question # 28

The Phase 2 of DITSCAP C&A is known as Verification. The goal of this phase is to obtain a fully integrated system for certification testing and accreditation. What are the process activities of this phase?

Each correct answer represents a complete solution. Choose all that apply.

A.

System development

B.

Certification analysis

C.

Registration

D.

Assessment of the Analysis Results

E.

Configuring refinement of the SSAA

Full Access
Question # 29

Sammy is the project manager for her organization. She would like to rate each risk based on its probability and affect on time, cost, and scope. Harry, a project team member, has never done this before and thinks Sammy is wrong to attempt this approach. Harry says that an accumulative risk score should be created, not three separate risk scores. Who is correct in this scenario?

A.

Sammy is correct, because organizations can create risk scores for each objective of the project.

B.

Harry is correct, because the risk probability and impact considers all objectives of the project.

C.

Harry is correct, the risk probability and impact matrix is the only approach to risk assessment.

D.

Sammy is correct, because she is the project manager.

Full Access
Question # 30

Which of the following is the acronym of RTM?

A.

Resource tracking method

B.

Requirements Traceability Matrix

C.

Resource timing method

D.

Requirements Testing Matrix

Full Access
Question # 31

Which of the following assessment methods is used to review, inspect, and analyze assessment objects?

A.

Testing

B.

Examination

C.

Interview

D.

Debugging

Full Access
Question # 32

Which of the following documents is used to provide a standard approach to the assessment of NIST SP 800-53 security controls?

A.

NIST SP 800-37

B.

NIST SP 800-41

C.

NIST SP 800-53A

D.

NIST SP 800-66

Full Access
Question # 33

Which of the following is NOT a type of penetration test?

A.

Cursory test

B.

Partial-knowledge test

C.

Zero-knowledge test

D.

Full knowledge test

Full Access
Question # 34

Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?

A.

Mandatory Access Control

B.

Role-Based Access Control

C.

Discretionary Access Control

D.

Policy Access Control

Full Access
Question # 35

Gary is the project manager of his organization. He is managing a project that is similar to a project his organization completed recently. Gary has decided that he will use the information from the past project to help him and the project team to identify the risks that may be present in the project. Management agrees that this checklist approach is ideal and will save time in the project. Which of the following statement is most accurate about the limitations of the checklist analysis approach for Gary?

A.

The checklist analysis approach is fast but it is impossible to build and exhaustive checklist.

B.

The checklist analysis approach only uses qualitative analysis.

C.

The checklist analysis approach saves time, but can cost more.

D.

The checklist is also known as top down risk assessment

Full Access
Question # 36

Which of the following concepts represent the three fundamental principles of information security?

Each correct answer represents a complete solution. Choose three.

A.

Privacy

B.

Integrity

C.

Availability

D.

Confidentiality

Full Access
Question # 37

An Authorizing Official plays the role of an approver. What are the responsibilities of an

Authorizing Official?

Each correct answer represents a complete solution. Choose all that apply.

A.

Establishing and implementing the organization's continuous monitoring program

B.

Determining the requirement of reauthorization and reauthorizing information systems when required

C.

Reviewing security status reports and critical security documents

D.

Ascertaining the security posture of the organization's information system

Full Access
Question # 38

Which of the following are the common roles with regard to data in an information classification program?

Each correct answer represents a complete solution. Choose all that apply.

A.

Custodian

B.

User

C.

Security auditor

D.

Editor

E.

Owner

Full Access
Question # 39

Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation. Which of the following statements are true about Certification and Accreditation?

Each correct answer represents a complete solution. Choose two.

A.

Accreditation is the official management decision given by a senior agency official to authorize operation of an information system.

B.

Accreditation is a comprehensive assessment of the management, operational, and technical security controls in an information system.

C.

Certification is the official management decision given by a senior agency official to authorize operation of an information system.

D.

Certification is a comprehensive assessment of the management, operational, and technical security controls in an information system.

Full Access
Question # 40

You are the project manager for your company and a new change request has been approved for your project. This change request, however, has introduced several new risks to the project. You have communicated these risk events and the project stakeholders understand the possible effects these risks could have on your project. You elect to create a mitigation response for the identified risk events. Where will you record the mitigation response?

A.

Project management plan

B.

Risk management plan

C.

Risk log

D.

Risk register

Full Access
Question # 41

Adrian is the project manager of the NHP Project. In her project there are several work packages that deal with electrical wiring. Rather than to manage the risk internally she has decided to hire a vendor to complete all work packages that deal with the electrical wiring. By removing the risk internally to a licensed electrician Adrian feels more comfortable with project team being safe.

What type of risk response has Adrian used in this example?

A.

Mitigation

B.

Transference

C.

Avoidance

D.

Acceptance

Full Access
Question # 42

You work as a project manager for BlueWell Inc. You are currently working with the project stakeholders to identify risks in your project. You understand that the qualitative risk assessment and analysis can reflect the attitude of the project team and other stakeholders to risk. Effective assessment of risk requires management of the risk attitudes of the participants. What should you, the project manager, do with assessment of identified risks in consideration of the attitude and bias of the participants towards the project risk?

A.

Document the bias for the risk events and communicate the bias with management

B.

Evaluate and document the bias towards the risk events

C.

Evaluate the bias through SWOT for true analysis of the risk events

D.

Evaluate the bias towards the risk events and correct the assessment accordingly

Full Access
Question # 43

Tom is the project manager for his organization. In his project he has recently finished the risk response planning. He tells his manager that he will now need to update the cost and schedule baselines. Why would the risk response planning cause Tom the need to update the cost and schedule baselines?

A.

New or omitted work as part of a risk responsecan cause changes to the cost and/or schedule baseline.

B.

Risk responses protect the time and investment of the project.

C.

Baselines should not be updated, but refined through versions.

D.

Risk responses may take time and money to implement.

Full Access
Question # 44

Certification and Accreditation (C&A or CnA) is a process for implementing information security.

Which of the following is the correct order of C&A phases in a DITSCAP assessment?

A.

Definition, Validation, Verification, and Post Accreditation

B.

Verification, Definition, Validation, and Post Accreditation

C.

Verification, Validation, Definition, and Post Accreditation

D.

Definition, Verification, Validation, and Post Accreditation

Full Access
Question # 45

You are the project manager for your organization. You have identified a risk event you’re your organization could manage internally or externally. If you manage the event internally it will cost your project $578,000 and an additional $12,000 per month the solution is in use. A vendor can manage the risk event for you. The vendor will charge $550,000 and $14,500 per month that the solution is in use. How many months will you need to use the solution to pay for the internal solution in comparison to the vendor's solution?

A.

Approximately 13 months

B.

Approximately 11 months

C.

Approximately 15 months

D.

Approximately 8 months

Full Access
Question # 46

You are the project manager of the NKQ project for your organization. You have completed the quantitative risk analysis process for this portion of the project. What is the only output of the quantitative risk analysis process?

A.

Probability of reaching project objectives

B.

Risk contingency reserve

C.

Risk response

D.

Risk register updates

Full Access
Question # 47

Which of the following assessment methodologies defines a six-step technical security evaluation?

A.

OCTAVE

B.

FITSAF

C.

DITSCAP

D.

FIPS 102

Full Access
Question # 48

The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the role of a supporter and advisor, respectively. Which of the following statements are true about ISSO and ISSE?

Each correct answer represents a complete solution. Choose all that apply.

A.

An ISSE provides advice on the impacts of system changes.

B.

An ISSE manages the security of the information system that is slated for Certification & Accreditation (C&A).

C.

An ISSO manages the security of the information system that is slated for Certification & Accreditation (C&A).

D.

An ISSO takes part in the development activities that are required to implement system changes.

E.

An ISSE provides advice on the continuous monitoring of the information system.

Full Access
Question # 49

Which of the following is a standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system?

A.

TCSEC

B.

FIPS

C.

SSAA

D.

FITSAF

Full Access
Question # 50

To help review or design security controls, they can be classified by several criteria. One of these criteria is based on time. According to this criteria, which of the following controls are intended to prevent an incident from occurring?

A.

Adaptive controls

B.

Preventive controls

C.

Detective controls

D.

Corrective controls

Full Access
Question # 51

Which of the following RMF phases identifies key threats and vulnerabilities that could compromise the confidentiality, integrity, and availability of the institutional critical assets?

A.

Phase 2

B.

Phase 1

C.

Phase 3

D.

Phase 0

Full Access
Question # 52

The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the role of a supporter and advisor, respectively. Which of the following statements are true about ISSO and ISSE?

Each correct answer represents a complete solution. Choose all that apply.

A.

An ISSE manages the security of the information system that is slated for Certification & Accreditation (C&A).

B.

An ISSO takes part in the development activities that are required to implement system ch anges.

C.

An ISSE provides advice on the continuous monitoring of the information system.

D.

An ISSE provides advice on the impacts of system changes.

E.

An ISSO manages the security of the information system that is slated for Certification & Accreditation (C&A).

Full Access
Question # 53

Which of the following processes is a structured approach to transitioning individuals, teams, and organizations from a current state to a desired future state?

A.

Configuration management

B.

Procurement management

C.

Change management

D.

Risk management

Full Access
Question # 54

During which of the following processes, probability and impact matrix is prepared?

A.

Plan Risk Responses

B.

Perform Quantitative Risk Analysis

C.

Perform Qualitative Risk Analysis

D.

Monitoring and Control Risks

Full Access
Question # 55

During which of the following processes, probability and impact matrix is prepared?

A.

Plan Risk Responses

B.

Perform Quantitative Risk Analysis

C.

Perform Qualitative Risk Analysis

D.

Monitoring and Control Risks

Full Access
Question # 56

Which of the following formulas was developed by FIPS 199 for categorization of an information system?

A.

SCinformation system = {(confidentiality, impact), (integrity, controls), (availability, risk)}

B.

SCinformation system = {(confidentiality, risk), (integrity, impact), (availability, controls)}

C.

SCinformation system = {(confidentiality, impact), (integrity, impact), (availability, impact)}

D.

SCinformation system = {(confidentiality, controls), (integrity, controls), (availability, controls )}

Full Access
Question # 57

Walter is the project manager of a large construction project. He'll be working with several vendors on the project. Vendors will be providing materials and labor for several parts of the project. Some of the works in the project are very dangerous so Walter has implemented safety requirements for all of the vendors and his own project team. Stakeholders for the project have added new requirements, which have caused new risks in the project. A vendor has identified a new risk that could affect the project if it comes into fruition. Walter agrees with the vendor and has updated the risk register and created potential risk responses to mitigate the risk. What should Walter also update in this scenario considering the risk event?

A.

Project contractual relationship with the vendor

B.

Project communications plan

C.

Project management plan

D.

Project scope statement

Full Access
Question # 58

There are seven risk responses for any project. Which one of the following is a valid risk response for a negative risk event?

A.

Enhance

B.

Exploit

C.

Acceptance

D.

Share

Full Access
Question # 59

You work as a project manager for BlueWell Inc. You with your team are using a method or a (technical) process that conceives the risks even if all theoretically possible safety measures would be applied. One of your team member wants to know that what is a residual risk. What will you reply to your team member?

A.

It is a risk that remains because no risk response is taken.

B.

It is a risk that remains after planned risk responses are taken.

C.

It is a risk that can not be addressed by a risk response.

D.

It is a risk that will remain no matter what type of risk response is offered.

Full Access