What is the role played by James in the organization?
James work as an IT systems personnel in SoftTech Inc. He performs the following tasks: Runs regular backups and routine tests of the validity of the backup data. Performs data restoration from the backups whenever required. Maintains the retained records in accordance with the established information classification policy. What is...
What type of risk response has Adrian used in this example?
Adrian is the project manager of the NHP Project. In her project there are several work packages that deal with electrical wiring. Rather than to manage the risk internally she has decided to hire a vendor to complete all work packages that deal with the electrical wiring. By removing the...
What increases when you fast track a project?
Your organization has a project that is expected to last 20 months but the customer would really like the project completed in 18 months. You have worked on similar projects in the past and believe that you could fast track the project and reach the 18 month deadline. What increases...
Which of the following is a subset discipline of Corporate Governance focused on information security systems and their performance and risk management?
Which of the following is a subset discipline of Corporate Governance focused on information security systems and their performance and risk management?A . Lanham ActB . ISGC . Clinger-Cohen ActD . Computer Misuse ActView AnswerAnswer: B
Which of the following professionals plays the role of a monitor and takes part in the organization's configuration management process?
Which of the following professionals plays the role of a monitor and takes part in the organization's configuration management process?A . Senior Agency Information Security OfficerB . Authorizing OfficialC . Common Control ProviderD . Chief Information OfficerView AnswerAnswer: C
Which of the following statements are true about Certification and Accreditation?
Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation. Which of the following statements are true about Certification and Accreditation? Each correct answer represents a...
What are the responsibilities of a Chief Information Officer?
The Chief Information Officer (CIO), or Information Technology (IT) director, is a job title commonly given to the most senior executive in an enterprise. What are the responsibilities of a Chief Information Officer? Each correct answer represents a complete solution. Choose all that apply.A . Preserving high-level communications and working...
Which of the following processes is a structured approach to transitioning individuals, teams, and organizations from a current state to a desired future state?
Which of the following processes is a structured approach to transitioning individuals, teams, and organizations from a current state to a desired future state?A . Procurement managementB . Change managementC . Risk managementD . Configuration managementView AnswerAnswer: B
Which one of the following is NOT an input to the perform quantitative risk analysis process?
There are five inputs to the quantitative risk analysis process. Which one of the following is NOT an input to the perform quantitative risk analysis process?A . Risk registerB . Cost management planC . Risk management planD . Enterprise environmental factorsView AnswerAnswer: D
Which of the following professionals is responsible for starting the Certification & Accreditation (C&A) process?
Which of the following professionals is responsible for starting the Certification & Accreditation (C&A) process?A . Authorizing OfficialB . Chief Risk Officer (CRO)C . Chief Information Officer (CIO)D . Information system ownerView AnswerAnswer: D