When will the quantitative risk analysis process need to be repeated?

Fred is the project manager of the PKL project. He is working with his project team to complete the quantitative risk analysis process as a part of risk management planning. Fred understands that once the quantitative risk analysis process is complete, the process will need to be completed again in...

August 7, 2019 No Comments READ MORE +

What term is assigned to the low-level of stakeholder tolerance in this project?

You are the project manager of the NKJ Project for your company. The project's success or failure will have a significant impact on your organization's profitability for the coming year. Management has asked you to identify the risk events and communicate the event's probability and impact as early as possible...

August 6, 2019 No Comments READ MORE +

What is the likely outcome of creating this type of chart?

Your project has several risks that may cause serious financial impact should they happen. You have studied the risk events and made some potential risk responses for the risk events but management wants you to do more. They'd like for you to create some type of a chart that identified...

August 6, 2019 No Comments READ MORE +

What are the different phases of System Authorization Plan?

System Authorization is the risk management process. System Authorization Plan (SAP) is a comprehensive and uniform approach to the System Authorization Process. What are the different phases of System Authorization Plan? Each correct answer represents a part of the solution. Choose all that apply.A . Post-AuthorizationB . Pre-certificationC . Post-certificationD...

August 6, 2019 No Comments READ MORE +

Which of the following are the common roles with regard to data in an information classification program? Each correct answer represents a complete solution. Choose all that apply.

Which of the following are the common roles with regard to data in an information classification program? Each correct answer represents a complete solution. Choose all that apply.A . CustodianB . UserC . Security auditorD . EditorE . OwnerView AnswerAnswer: ABCE

August 5, 2019 No Comments READ MORE +

Which one of the following will NOT help Wendy to perform this project management activity?

Wendy is about to perform qualitative risk analysis on the identified risks within her project. Which one of the following will NOT help Wendy to perform this project management activity?A . Stakeholder registerB . Risk registerC . Project scope statementD . Risk management planView AnswerAnswer: A

August 5, 2019 No Comments READ MORE +

What are the subordinate tasks of the Initiate and Plan IA C&A phase of the DIACAP process? Each correct answer represents a complete solution. Choose all that apply.

What are the subordinate tasks of the Initiate and Plan IA C&A phase of the DIACAP process? Each correct answer represents a complete solution. Choose all that apply.A . Develop DIACAP strategy.B . Assign IA controls.C . Assemble DIACAP team.D . Initiate IA implementation plan.E . Register system with DoD...

August 5, 2019 No Comments READ MORE +

According to this criteria, which of the following controls consists of incident response processes, management oversight, security awareness, and training?

To help review or design security controls, they can be classified by several criteria. One of these criteria is based on nature. According to this criteria, which of the following controls consists of incident response processes, management oversight, security awareness, and training?A . Technical controlB . Physical controlC . Procedural...

August 5, 2019 No Comments READ MORE +

Which of the following assessment methodologies defines a six-step technical security evaluation?

Which of the following assessment methodologies defines a six-step technical security evaluation?A . FITSAFB . FIPS 102C . OCTAVED . DITSCAPView AnswerAnswer: B

August 4, 2019 No Comments READ MORE +

Which of the following roles is also known as the accreditor?

Which of the following roles is also known as the accreditor?A . Chief Risk OfficerB . Data ownerC . Designated Approving AuthorityD . Chief Information OfficerView AnswerAnswer: C

August 3, 2019 No Comments READ MORE +