image


CAP Dumps CAP Braindumps

CAP Real Questions CAP Practice Test CAP Actual Questions


ISA


CAP


Certified Authorization Professional


https://killexams.com/pass4sure/exam-detail/CAP


QUESTION: 384

An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?


  1. Anonymous

  2. Multi-factor

  3. Biometrics

  4. Mutual


Answer: B


QUESTION: 385

In 2003, NIST developed a new Certification & Accreditation (C&A) guideline known as FIPS

199. What levels of potential impact are defined by FIPS 199? Each correct answer represents a

complete solution. Choose all that apply.


  1. Low

  2. Moderate

  3. High

  4. Medium


Answer: A, C, D


QUESTION: 386

Which of the following is NOT an objective of the security program?


  1. Security organization

  2. Security plan

  3. Security education

  4. Information classification


Answer: B


Walter is the project manager of a large construction project. He'll be working with several vendors on the project. Vendors will be providing materials and labor for several parts of the project. Some of the works in the project are very dangerous so Walter has implemented safety requirements for all of the vendors and his own project team. Stakeholders for the project have added new requirements, which have caused new risks in the project. A vendor has identified a new risk that could affect the project if it comes into fruition. Walter agrees with the vendor and has updated the risk register and created potential risk responses to mitigate the risk. What should Walter also update in this scenario considering the risk event?


  1. Project contractual relationship with the vendor

  2. Project communications plan

  3. Project management plan

  4. Project scope statement


Answer: C


QUESTION: 388

During which of the following processes, probability and impact matrix is prepared?


  1. Plan Risk Responses

  2. Perform Quantitative Risk Analysis

  3. Perform Qualitative Risk Analysis

  4. Monitoring and Control Risks


Answer: C


QUESTION: 389

During qualitative risk analysis you want to define the risk urgency assessment. All of the following are indicators of risk priority except for which one?


  1. Symptoms

  2. Cost of the project

  3. Warning signs

  4. Risk rating


Answer: B


Which of the following statements about Discretionary Access Control List (DACL) is true?


  1. It is a rule list containing access control entries.

  2. It specifies whether an audit activity should be performed when an object attempts to access a resource.

  3. It is a list containing user accounts, groups, and computers that are allowed (or denied) access to the object.

  4. It is a unique number that identifies a user, group, and computer account


Answer: C


QUESTION: 391

Which of the following is used to indicate that the software has met a defined quality level and is

ready for mass distribution either by electronic means or by physical media?


  1. DAA

  2. RTM

  3. ATM

  4. CRO


Answer: B


QUESTION: 392

Which of the following processes is a structured approach to transitioning individuals, teams,

and organizations from a current state to a desired future state?


  1. Configuration management

  2. Procurement management

  3. Change management

  4. Risk management


A security policy is an overall general statement produced by senior management that dictates what role security plays within the organization. What are the different types of policies? Each correct answer represents a complete solution. Choose all that apply.


  1. Systematic

  2. Regulatory

  3. Advisory

  4. Informative


Answer: B, C, D


QUESTION: 394

Which of the following is a standard that sets basic requirements for assessing the effectiveness

of computer security controls built into a computer system?


  1. TCSEC

  2. FIPS

  3. SSAA

  4. FITSAF


Answer: A


QUESTION: 395

Which of the following statements correctly describes DIACAP residual risk?


  1. It is the remaining risk to the information system after risk palliation has occurred.

  2. It is a process of security authorization.

  3. It is the technical implementation of the security design.

  4. It is used to validate the information system.


Answer: A


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG