A) PKI
B) Mutual authentication
C) Biometrics
D) Kerberos
Correct Answer
verified
Multiple Choice
A) Cause and effect diagrams
B) System or process flowcharts
C) Predecessor and successor diagramming
D) Influence diagrams
Correct Answer
verified
Multiple Choice
A) Manager
B) Owner
C) Custodian
D) User
Correct Answer
verified
Multiple Choice
A) External risk response
B) Internal risk management strategy
C) Contingent response strategy
D) Expert judgment
Correct Answer
verified
Multiple Choice
A) Project charter
B) Risk management plan
C) Risk register
D) Quality management plan
Correct Answer
verified
Multiple Choice
A) SCinformation system = {(confidentiality, impact) , (integrity, controls) , (availability, risk) }
B) SCinformation system = {(confidentiality, risk) , (integrity, impact) , (availability, controls) }
C) SCinformation system = {(confidentiality, impact) , (integrity, impact) , (availability, impact) }
D) SCinformation system = {(confidentiality, controls) , (integrity, controls) , (availability, controls ) }
Correct Answer
verified
Multiple Choice
A) Safeguards
B) Preventive controls
C) Detective controls
D) Corrective controls
Correct Answer
verified
Multiple Choice
A) Opportunities
B) Benefits
C) Ancillary constituent components
D) Contingency risks
Correct Answer
verified
Multiple Choice
A) Probability of reaching project objectives
B) Risk contingency reserve
C) Risk response
D) Risk register updates
Correct Answer
verified
Multiple Choice
A) Common control provider
B) Information system owner
C) Authorizing official
D) Chief information officer
Correct Answer
verified
Multiple Choice
A) Document the bias for the risk events and communicate the bias with management
B) Evaluate and document the bias towards the risk events
C) Evaluate the bias through SWOT for true analysis of the risk events
D) Evaluate the bias towards the risk events and correct the assessment accordingly
Correct Answer
verified
Multiple Choice
A) Change Control
B) Data Hiding
C) Configuration Management
D) Data Classification
Correct Answer
verified
Multiple Choice
A) PON
B) ZOPA
C) BATNA
D) Bias
Correct Answer
verified
Multiple Choice
A) The checklist analysis approach is fast but it is impossible to build and exhaustive checklist.
B) The checklist analysis approach only uses qualitative analysis.
C) The checklist analysis approach saves time, but can cost more.
D) The checklist is also known as top down risk assessment
Correct Answer
verified
Multiple Choice
A) Project communications plan
B) Project management plan
C) Project contractual relationship with the vendor
D) Project scope statement
Correct Answer
verified
Multiple Choice
A) Accreditation is the official management decision given by a senior agency official to authorize operation of an information system.
B) Accreditation is a comprehensive assessment of the management, operational, and technical security controls in an information system.
C) Certification is the official management decision given by a senior agency official to authorize operation of an information system.
D) Certification is a comprehensive assessment of the management, operational, and technical security controls in an information system.
Correct Answer
verified
Multiple Choice
A) Risk owner
B) Risk category
C) Impact
D) Cost
Correct Answer
verified
Multiple Choice
A) Information security policy for the organization
B) System architecture management
C) Business continuity management
D) System development and maintenance
E) Personnel security
Correct Answer
verified
Multiple Choice
A) Qualitative risk analysis
B) Quantitative analysis
C) Historical information
D) Rolling wave planning
Correct Answer
verified
Multiple Choice
A) Risk-related contract decisions
B) Project document updates
C) Risk register updates
D) Organizational process assets updates
Correct Answer
verified
Showing 101 - 120 of 313
Related Exams