Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following CAP Exam is Retired now. Please select the alternative replacement for your Exam Certification.

CAP Exam Dumps - CAP - Certified Authorization Professional

Go to page:
Question # 4

Harry is a project manager of a software development project. In the early stages of planning, he and the stakeholders operated with the belief that the software they were developing would work with their organization's current computer operating system. Now that the project team has started developing the software it has become apparent that the software will not work with nearly half of the organization's computer operating systems. The incorrect belief Harry had in the software compatibility is an example of what in project management?

A.

Assumption

B.

Issue

C.

Risk

D.

Constraint

Full Access
Question # 5

Which of the following statements best describes the difference between the role of a data owner and the role of a data custodian?

A.

The custodian implements the information classification scheme after the initial assignment by the operations manager.

B.

The datacustodian implements the information classification scheme after the initial assignment by the data owner.

C.

The data owner implements the information classification scheme after the initial assignment by the custodian.

D.

The custodian makes the initialinformation classification assignments, and the operations manager implements the scheme.

Full Access
Question # 6

Which of the following access control models uses a predefined set of access privileges for an object of a system?

A.

Discretionary Access Control

B.

Mandatory Access Control

C.

Policy Access Control

D.

Role-Based Access Control

Full Access
Question # 7

Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?

A.

Continuity of Operations Plan

B.

Disaster recovery plan

C.

Contingency plan

D.

Business continuity plan

Full Access
Question # 8

Penetration testing (also called pen testing) is the practice of testing a computer system, network, or Web application to find vulnerabilities that an attacker could exploit. Which of the following areas can be exploited in a penetration test?

Each correct answer represents a complete solution. Choose all that apply.

A.

Race conditions

B.

Social engineering

C.

Information system architectures

D.

Buffer overflows

E.

Kernel flaws

F.

Trojan horses

G.

File and directory permissions

Full Access
Go to page: