CAP Certification Free Questions – Certified Authorization Professional

Passquestion CAP Certification Free Questions can not only help customers pass their first time to attend CAP Certified Authorization Professional exam, but also provide free online update service for them, which will delivery the latest exam materials to customers at the first time to let them know the latest certification exam information. If you are sure that you want to pass CAP Certified Authorization Professional exam, then your selecting to purchase the CAP Certification Free Questions of Passquestion is very cost-effective.

CAP Certification Free Questions – Certified Authorization Professional

1. Which of the following professionals plays the role of a monitor and takes part in the organization’s configuration management process?

 
 
 
 

2. The Chief Information Officer (CIO), or Information Technology (IT) director, is a job title commonly given to the most senior executive in an enterprise.

What are the responsibilities of a Chief Information Officer? Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

3. The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the role of a supporter and advisor, respectively.

Which of the following statements are true about ISSO and ISSE? Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 
 

4. Which of the following professionals is responsible for starting the Certification & Accreditation (C&A) process?

 
 
 
 

5. Which of the following assessment methodologies defines a six-step technical security evaluation?

 
 
 
 

6. DIACAP applies to the acquisition, operation, and sustainment of any DoD system that collects, stores, transmits, or processes unclassified or classified information since December 1997.

What phases are identified by DIACAP? Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 
 
 

7. Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them.

Which of the following access control models will he use?

 
 
 
 

8. Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?

 
 
 
 

9. James work as an IT systems personnel in SoftTech Inc. He performs the following tasks: Runs regular backups and routine tests of the validity of the backup data. Performs data restoration from the backups whenever required. Maintains the retained records in accordance with the established information classification policy.

What is the role played by James in the organization?

 
 
 
 

10. FITSAF stands for Federal Information Technology Security Assessment Framework. It is a methodology for assessing the security of information systems.

Which of the following FITSAF levels shows that the procedures and controls have been implemented?

 
 
 
 
 

11. Certification and Accreditation (C&A or CnA) is a process for implementing information security.

Which of the following is the correct order of C&A phases in a DITSCAP assessment?

 
 
 
 

12. System Authorization is the risk management process. System Authorization Plan (SAP) is a comprehensive and uniform approach to the System Authorization Process.

What are the different phases of System Authorization Plan? Each correct answer represents a part of the solution. Choose all that apply.

 
 
 
 
 

13. Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation.

Which of the following statements are true about Certification and Accreditation? Each correct answer represents a complete solution. Choose two.

 
 
 
 

14. Which of the following requires all general support systems and major applications to be fully certified and accredited before these systems and applications are put into production? Each correct answer represents a part of the solution. Choose all that apply.

 
 
 
 

15. The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information.

What are the different types of NIACAP accreditation? Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

16. According to U.S. Department of Defense (DoD) Instruction 8500.2, there are eight Information Assurance (IA) areas, and the controls are referred to as IA controls.

Which of the following are among the eight areas of IA defined by DoD? Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

17. DIACAP applies to the acquisition, operation, and sustainment of any DoD system that collects, stores, transmits, or processes unclassified or classified information since December 1997.

What phases are identified by DIACAP? Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 
 
 

18. Which of the following is a subset discipline of Corporate Governance focused on information security systems and their performance and risk management?

 
 
 
 

19. Ben is the project manager of the YHT Project for his company. Alice, one of his team members, is confused about when project risks will happen in the project.

Which one of the following statements is the most accurate about when project risk happens?

 
 
 
 

20. You are the project manager of the NKJ Project for your company. The project’s success or failure will have a significant impact on your organization’s profitability for the coming year. Management has asked you to identify the risk events and communicate the event’s probability and impact as early as possible in the project. Management wants to avoid risk events and needs to analyze the cost-benefits of each risk event in this project.

What term is assigned to the low-level of stakeholder tolerance in this project?

 
 
 
 

Leave a Reply

Your email address will not be published. Required fields are marked *