Free Sharing Of (ISC)2 CAP Brain Dumps From Lead2pass:
https://www.lead2pass.com/cap.html
QUESTION 31
In which of the following testing methodologies do assessors use all available documentation and work under no constraints, and attempt to circumvent the security features of an information system?
A. Full operational test
B. Walk-through test
C. Penetration test
D. Paper test
Answer: C
QUESTION 32
Which of the following DITSCAP phases validates that the preceding work has produced an IS that operates in a specified computing environment?
A. Phase 4
B. Phase 3
C. Phase 2
D. Phase 1
Answer: B
QUESTION 33
Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?
A. Safeguards
B. Preventive controls
C. Detective controls
D. Corrective controls
Answer: D
QUESTION 34
Which of the following roles is also known as the accreditor?
A. Chief Risk Officer
B. Data owner
C. Designated Approving Authority
D. Chief Information Officer
Answer: C
QUESTION 35
In which of the following phases of the DITSCAP process does Security Test and Evaluation (ST&E) occur?
A. Phase 2
B. Phase 3
C. Phase 1
D. Phase 4
Answer: B
QUESTION 36
What component of the change management system is responsible for evaluating, testing, and documenting changes created to the project scope?
A. Configuration Management System
B. Project Management InformationSystem
C. Scope Verification
D. Integrated Change Control
Answer: A
QUESTION 37
A project team member has just identified a new project risk. The risk event is determined to have significant impact but a low probability in the project. Should the risk event happen it’ll cause the project to be delayed by three weeks, which will cause new risk in the project. What should the project manager do with the risk event?
A. Add the identified risk to a quality control management control chart.
B. Add the identified risk to the risk register.
C. Add the identified risk to the issues log.
D. Add the identified risk to the low-level risk watchlist.
Answer: B
QUESTION 38
Which of the following concepts represent the three fundamental principles of information security?
Each correct answer represents a complete solution. Choose three.
A. Privacy
B. Integrity
C. Availability
D. Confidentiality
Answer: BCD
QUESTION 39
Which of the following governance bodies provides management, operational and technical controls to satisfy security requirements?
A. Chief Information Security Officer
B. Senior Management
C. Information Security Steering Committee
D. Business Unit Manager
Answer: B
QUESTION 40
Your organization has a project that is expected to last 20 months but the customer would really like the project completed in 18 months. You have worked on similar projects in the past and believe that you could fast track the project and reach the 18 month deadline. What increases when you fast track a project?
A. Risks
B. Costs
C. Resources
D. Communication
Answer: A
CAP dumps full version (PDF&VCE): https://www.lead2pass.com/cap.html
Large amount of free CAP exam questions on Google Drive: https://drive.google.com/open?id=1-r0YSwCbXcNQ-OMWyTTqOvJ9XWNIRbjP