Question 85

You work as a project manager for BlueWell Inc. You are about to complete the quantitative risk analysis process for your project. You can use three available tools and techniques to complete this process. Which one of the following is NOT a tool or technique that is appropriate for the quantitative risk analysis process?

Correct Answer:D

Question 86

An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?

Correct Answer:D

Question 87

Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?

Correct Answer:D

Question 88

Which of the following NIST documents defines impact?

Correct Answer:C

Question 89

Certification and Accreditation (C&A or CnA) is a process for implementing information security.
Which of the following is the correct order of C&A phases in a DITSCAP assessment?

Correct Answer:D

Question 90

Penetration testing (also called pen testing) is the practice of testing a computer system, network, or Web application to find vulnerabilities that an attacker could exploit. Which of the following areas can be exploited in a penetration test?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ABDEFG

START CAP EXAM