Question.46 Frank is the project manager of the NHH Project. He is working with the project team to create a plan to document the procedures to manage risks throughout the project. This document will define how risks will be identified and quantified. It will also define how contingency plans will be implemented by the project team. What document is Frank and the NHH Project team creating in this scenario? (A) Project management plan (B) Resource management plan (C) Risk management plan (D) Project plan |
46. Click here to View Answer
Correct Answer: C
Question.47 In which of the following testing methodologies do assessors use all available documentation and work under no constraints, and attempt to circumvent the security features of an information system? (A) Full operational test (B) Walk-through test (C) Penetration test (D) Paper test |
47. Click here to View Answer
Correct Answer: L
Question.48 Which of the following DITSCAP phases validates that the preceding work has produced an IS that operates in a specified computing environment? (A) Phase 4 (B) Phase 3 (C) Phase 2 (D) Phase 1 |
48. Click here to View Answer
Correct Answer: B
Question.49 Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident? (A) Safeguards (B) Preventive controls (C) Detective controls (D) Corrective controls |
49. Click here to View Answer
Correct Answer: D
Question.50 Which of the following roles is also known as the accreditor? (A) Chief Risk Officer (B) Data owner (C) Designated Approving Authority (D) Chief Information Officer |
50. Click here to View Answer
Correct Answer: C