Filters
Question type

Study Flashcards

Which of the following methods of authentication uses finger prints to identify users?


A) PKI
B) Mutual authentication
C) Biometrics
D) Kerberos

Correct Answer

verifed

verified

You are the project manager of QSL project for your organization. You are working you're your project team and several key stakeholders to create a diagram that shows how various elements of a system interrelate and the mechanism of causation within the system. What diagramming technique are you using as a part of the risk identification process?


A) Cause and effect diagrams
B) System or process flowcharts
C) Predecessor and successor diagramming
D) Influence diagrams

Correct Answer

verifed

verified

James work as an IT systems personnel in SoftTech Inc. He performs the following tasks: Runs regular backups and routine tests of the validity of the backup data. Performs data restoration from the backups whenever required. Maintains the retained records in accordance with the established information classification policy. What is the role played by James in the organization?


A) Manager
B) Owner
C) Custodian
D) User

Correct Answer

verifed

verified

Mary is the project manager of the HGH Project for her company. She and her project team have agreed that if the vendor is late by more than ten days they will cancel the order and hire the NBG Company to fulfill the order. The NBG Company can guarantee orders within three days, but the costs of their products are significantly more expensive than the current vendor. What type of a response strategy is this?


A) External risk response
B) Internal risk management strategy
C) Contingent response strategy
D) Expert judgment

Correct Answer

verifed

verified

Which of the following documents is described in the statement below? "It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning."


A) Project charter
B) Risk management plan
C) Risk register
D) Quality management plan

Correct Answer

verifed

verified

Which of the following formulas was developed by FIPS 199 for categorization of an information system?


A) SCinformation system = {(confidentiality, impact) , (integrity, controls) , (availability, risk) }
B) SCinformation system = {(confidentiality, risk) , (integrity, impact) , (availability, controls) }
C) SCinformation system = {(confidentiality, impact) , (integrity, impact) , (availability, impact) }
D) SCinformation system = {(confidentiality, controls) , (integrity, controls) , (availability, controls ) }

Correct Answer

verifed

verified

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?


A) Safeguards
B) Preventive controls
C) Detective controls
D) Corrective controls

Correct Answer

verifed

verified

Thomas is the project manager of the NHJ Project for his company. He has identified several positive risk events within his project and he thinks these events can save the project time and money. Positive risk events, such as these within the NHJ Project are also known as what?


A) Opportunities
B) Benefits
C) Ancillary constituent components
D) Contingency risks

Correct Answer

verifed

verified

You are the project manager of the NKQ project for your organization. You have completed the quantitative risk analysis process for this portion of the project. What is the only output of the quantitative risk analysis process?


A) Probability of reaching project objectives
B) Risk contingency reserve
C) Risk response
D) Risk register updates

Correct Answer

verifed

verified

Which of the following individuals is responsible for configuration management and control task?


A) Common control provider
B) Information system owner
C) Authorizing official
D) Chief information officer

Correct Answer

verifed

verified

You work as a project manager for BlueWell Inc. You are currently working with the project stakeholders to identify risks in your project. You understand that the qualitative risk assessment and analysis can reflect the attitude of the project team and other stakeholders to risk. Effective assessment of risk requires management of the risk attitudes of the participants. What should you, the project manager, do with assessment of identified risks in consideration of the attitude and bias of the participants towards the project risk?


A) Document the bias for the risk events and communicate the bias with management
B) Evaluate and document the bias towards the risk events
C) Evaluate the bias through SWOT for true analysis of the risk events
D) Evaluate the bias towards the risk events and correct the assessment accordingly

Correct Answer

verifed

verified

Which of the following processes is used to protect the data based on its secrecy, sensitivity, or confidentiality?


A) Change Control
B) Data Hiding
C) Configuration Management
D) Data Classification

Correct Answer

verifed

verified

What course of action can be taken by a party if the current negotiations fail and an agreement cannot be reached?


A) PON
B) ZOPA
C) BATNA
D) Bias

Correct Answer

verifed

verified

Gary is the project manager of his organization. He is managing a project that is similar to a project his organization completed recently. Gary has decided that he will use the information from the past project to help him and the project team to identify the risks that may be present in the project. Management agrees that this checklist approach is ideal and will save time in the project. Which of the following statement is most accurate about the limitations of the checklist analysis approach for Gary?


A) The checklist analysis approach is fast but it is impossible to build and exhaustive checklist.
B) The checklist analysis approach only uses qualitative analysis.
C) The checklist analysis approach saves time, but can cost more.
D) The checklist is also known as top down risk assessment

Correct Answer

verifed

verified

Walter is the project manager of a large construction project. He'll be working with several vendors on the project. Vendors will be providing materials and labor for several parts of the project. Some of the works in the project are very dangerous so Walter has implemented safety requirements for all of the vendors and his own project team. Stakeholders for the project have added new requirements, which have caused new risks in the project. A vendor has identified a new risk that could affect the project if it comes into fruition. Walter agrees with the vendor and has updated the risk register and created potential risk responses to mitigate the risk. What should Walter also update in this scenario considering the risk event?


A) Project communications plan
B) Project management plan
C) Project contractual relationship with the vendor
D) Project scope statement

Correct Answer

verifed

verified

Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation. Which of the following statements are true about Certification and Accreditation? Each correct answer represents a complete solution. Choose two.


A) Accreditation is the official management decision given by a senior agency official to authorize operation of an information system.
B) Accreditation is a comprehensive assessment of the management, operational, and technical security controls in an information system.
C) Certification is the official management decision given by a senior agency official to authorize operation of an information system.
D) Certification is a comprehensive assessment of the management, operational, and technical security controls in an information system.

Correct Answer

verifed

verified

You are the project manager for your organization. You are working with your project team to complete the qualitative risk analysis process. The first tool and technique you are using requires that you assess the probability and what other characteristic of each identified risk in the project?


A) Risk owner
B) Risk category
C) Impact
D) Cost

Correct Answer

verifed

verified

ISO 17799 has two parts. The first part is an implementation guide with guidelines on how to build a comprehensive information security infrastructure and the second part is an auditing guide based on requirements that must be met for an organization to be deemed compliant with ISO 17799. What are the ISO 17799 domains? Each correct answer represents a complete solution. Choose all that apply.


A) Information security policy for the organization
B) System architecture management
C) Business continuity management
D) System development and maintenance
E) Personnel security

Correct Answer

verifed

verified

You work as a project manager for BlueWell Inc. You are working on a project and the management wants a rapid and cost-effective means for establishing priorities for planning risk responses in your project. Which risk management process can satisfy management's objective for your project?


A) Qualitative risk analysis
B) Quantitative analysis
C) Historical information
D) Rolling wave planning

Correct Answer

verifed

verified

You are the project manager of the NHH project for your company. You have completed the first round of risk management planning and have created four outputs of the risk response planning process. Which one of the following is NOT an output of the risk response planning?


A) Risk-related contract decisions
B) Project document updates
C) Risk register updates
D) Organizational process assets updates

Correct Answer

verifed

verified

Showing 101 - 120 of 313

Related Exams

Show Answer