Question 37

Which of the following formulas was developed by FIPS 199 for categorization of an information system?

Correct Answer:B

Question 38

Which of the following is not a part of Identify Risks process?

Correct Answer:C

Question 39

Which of the following statements about Discretionary Access Control List (DACL) is true?

Correct Answer:D

Question 40

Which of the following processes is described in the statement below?
"It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project."

Correct Answer:B

Question 41

Which of the following is a standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system?

Correct Answer:A

Question 42

Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

Correct Answer:C

START CAP EXAM