Exam Code : CAP
Exam Name : Certified Authorization Professional
Vendor Name :
"ISA"
CAP Dumps CAP Braindumps
CAP Real Questions CAP Practice Test CAP Actual Questions
killexams.com
Certified Authorization Professional
https://killexams.com/pass4sure/exam-detail/CAP
An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?
Anonymous
Multi-factor
Biometrics
Mutual
In 2003, NIST developed a new Certification & Accreditation (C&A) guideline known as FIPS
199. What levels of potential impact are defined by FIPS 199? Each correct answer represents a
complete solution. Choose all that apply.
Low
Moderate
High
Medium
Which of the following is NOT an objective of the security program?
Security organization
Security plan
Security education
Information classification
Walter is the project manager of a large construction project. He'll be working with several vendors on the project. Vendors will be providing materials and labor for several parts of the project. Some of the works in the project are very dangerous so Walter has implemented safety requirements for all of the vendors and his own project team. Stakeholders for the project have added new requirements, which have caused new risks in the project. A vendor has identified a new risk that could affect the project if it comes into fruition. Walter agrees with the vendor and has updated the risk register and created potential risk responses to mitigate the risk. What should Walter also update in this scenario considering the risk event?
Project contractual relationship with the vendor
Project communications plan
Project management plan
Project scope statement
During which of the following processes, probability and impact matrix is prepared?
Plan Risk Responses
Perform Quantitative Risk Analysis
Perform Qualitative Risk Analysis
Monitoring and Control Risks
During qualitative risk analysis you want to define the risk urgency assessment. All of the following are indicators of risk priority except for which one?
Symptoms
Cost of the project
Warning signs
Risk rating
Which of the following statements about Discretionary Access Control List (DACL) is true?
It is a rule list containing access control entries.
It specifies whether an audit activity should be performed when an object attempts to access a resource.
It is a list containing user accounts, groups, and computers that are allowed (or denied) access to the object.
It is a unique number that identifies a user, group, and computer account
Which of the following is used to indicate that the software has met a defined quality level and is
ready for mass distribution either by electronic means or by physical media?
DAA
RTM
ATM
CRO
Which of the following processes is a structured approach to transitioning individuals, teams,
and organizations from a current state to a desired future state?
Configuration management
Procurement management
Change management
Risk management
A security policy is an overall general statement produced by senior management that dictates what role security plays within the organization. What are the different types of policies? Each correct answer represents a complete solution. Choose all that apply.
Systematic
Regulatory
Advisory
Informative
Which of the following is a standard that sets basic requirements for assessing the effectiveness
of computer security controls built into a computer system?
TCSEC
FIPS
SSAA
FITSAF
Which of the following statements correctly describes DIACAP residual risk?
It is the remaining risk to the information system after risk palliation has occurred.
It is a process of security authorization.
It is the technical implementation of the security design.
It is used to validate the information system.