Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following CAP Exam is Retired now. Please select the alternative replacement for your Exam Certification.

CAP Exam Dumps - CAP - Certified Authorization Professional

Go to page:
Question # 9

Which of the following is NOT an objective of the security program?

A.

Security plan

B.

Security education

C.

Security organization

D.

Information classification

Full Access
Question # 10

Which of the following processes is described in the statement below?

"This is the process of numerically analyzing the effect of identified risks on overall project objectives."

A.

Identify Risks

B.

Perform Quantitative Risk Analysis

C.

Perform Qualitative Risk Analysis

D.

Monitor and Control Risks

Full Access
Question # 11

You are the project manager of the HJK project for your organization. You and the project team have created risk responses for many of the risk events in the project. A teaming agreement is an example of what risk response?

A.

Acceptance

B.

Mitigation

C.

Sharing

D.

Transference

Full Access
Question # 12

Which of the following assessment methods is used to review, inspect, and analyze assessment objects?

A.

Testing

B.

Examination

C.

Interview

D.

Debugging

Full Access
Question # 13

You are the project manager of the NNH Project. In this project you have created a contingency response that the schedule performance index should be less than 0.93. The NHH Project has a budget at completion of $945,000 and is 45 percent complete though the project should be 49 percent complete. The project has spent $455,897 to reach the 45 percent complete milestone.

What is the project's schedule performance index?

A.

1.06

B.

0.93

C.

-$37,800

D.

0.92

Full Access
Question # 14

Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

A.

Hackers

B.

Visitors

C.

Customers

D.

Employees

Full Access
Question # 15

Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation. Which of the following statements are true about Certification and Accreditation?

Each correct answer represents a complete solution. Choose two.

A.

Certification is a comprehensive assessment of the management, operational, and technical security controls in an information system.

B.

Accreditation is a comprehensive assessment of the management, operational, and technical security controls in an information system.

C.

Certification isthe official management decision given by a senior agency official to authorize operation of an information system.

D.

Accreditation is the official management decision given by a senior agency official to authorize operation of an information system.

Full Access
Question # 16

Joan is a project management consultant and she has been hired by a firm to help them identify risk events within the project. Joan would first like to examine the project documents including the plans, assumptions lists, project files, and contracts. What key thing will help Joan to discover risks within the review of the project documents?

A.

Lack of consistency between the plans and the project requirements and assumptions can bethe indicators of risk in the project.

B.

The project documents will help the project manager, or Joan, to identify what risk identification approach is best to pursue.

C.

Plans that have loose definitions of terms and disconnected approaches will revealrisks.

D.

Poorly written requirements will reveal inconsistencies in the project plans and documents.

Full Access
Go to page: