Free CAP Exam Braindumps (page: 40)

Page 14 of 99

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?

  1. Safeguards
  2. Preventive controls
  3. Detective controls
  4. Corrective controls

Answer(s): D



Which of the following roles is also known as the accreditor?

  1. Chief Risk Officer
  2. Data owner
  3. Designated Approving Authority
  4. Chief Information Officer

Answer(s): C



In which of the following phases of the DITSCAP process does Security Test and Evaluation (ST&E) occur?

  1. Phase 2
  2. Phase 3
  3. Phase 1
  4. Phase 4

Answer(s): B



You are the project manager of the NHH project for your company. You have completed the first round of risk management planning and have created four outputs of the risk response planning process.
Which one of the following is NOT an output of the risk response planning?

  1. Risk-related contract decisions
  2. Project document updates
  3. Risk register updates
  4. Organizational process assets updates

Answer(s): D






Post your Comments and Discuss ISC CAP exam with other Community members:

CAP Exam Discussions & Posts