Question 19

Your project team has identified a project risk that must be responded to. The risk has been recorded in the risk register and the project team has been discussing potential risk responses for the risk event. The event is not likely to happen for several months but the probability of the event is high. Which one of the following is a valid response to the identified risk event?

Correct Answer:A

Question 20

Which of the following assessment methodologies defines a six-step technical security evaluation?

Correct Answer:D

Question 21

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?

Correct Answer:D

Question 22

Which of the following RMF phases is known as risk analysis?

Correct Answer:A

Question 23

Thomas is a key stakeholder in your project. Thomas has requested several changes to the project scope for the project you are managing. Upon review of the proposed changes, you have discovered that these new requirements are laden with risks and you recommend to the change control board that the changes be excluded from the project scope. The change control board agrees with you. What component of the change control system communicates the approval or denial of a proposed change request?

Correct Answer:D

Question 24

Which of the following recovery plans includes a monitoring process and triggers for initiating planned actions?

Correct Answer:B

START CAP EXAM