Dont wait with regard to too prolonged. You can start right right now and buy our ISC2 CAP goods for the entry to the free downloadable ISC2 CAP braindumps. We have the top ISC2 certification practice questions resource for the CAP exam. Many of us ensure in which by using Pass4sure ISC2 ISC2 exam questions and answers you will be fully prepared to acquire through the ISC2 CAP exam. Or you will get entire money rear.

2021 Sep CAP braindumps

Q91. Harry is a project manager of a software development project. In the early stages of planning, he and the stakeholders operated with the belief that the software they were developing would work with their organization's current computer operating system. Now that the project team has started developing the software it has become apparent that the software will not work with nearly half of the organization's computer operating systems. The incorrect belief Harry had in the software compatibility is an example of what in project management?

A. Assumption

B. Issue

C. Risk

D. Constraint

Answer: A


Q92. Courtney is the project manager for her organization. She is working with the project team to complete the qualitative risk analysis for her project. During the analysis Courtney encourages the project team to begin the grouping of identified risks by common causes. What is the primary advantage to group risks by common causes during qualitative risk analysis?

A. It can lead to developing effective risk responses.

B. It can lead to the creation of risk categories unique to each project.

C. It helps the project team realize the areas of the project most laden with risks.

D. It saves time by collecting the related resources, such as project team members, to analyze the risk events.

Answer: A


Q93. You work as a project manager for BlueWell Inc. Management has asked you to work with the key project stakeholder to analyze the risk events you have identified in the project. They would like you to analyze the project risks with a goal of improving the project's performance as a whole.

What approach can you use to achieve the goal of improving the project's performance through risk analysis with your project stakeholders?

A. Involve subject matter experts in the risk analysis activities

B. Focus on the high-priority risks through qualitative risk analysis

C. Use qualitative risk analysis to quickly assess the probability and impact of risk events

D. Involve the stakeholders for risk identification only in the phases where the project directlyaffects them

Answer: B


Q94. The IAM/CA makes certification accreditation recommendations to the DAA. The DAA issues accreditation determinations. Which of the following are the accreditation determinations issued by the DAA?

Each correct answer represents a complete solution. Choose all that apply.

A. IATO

B. ATO

C. IATT

D. ATT

E. DATO

Answer: ABCE


Q95. Which of the following refers to the ability to ensure that the data is not modified or tampered with?

A. Confidentiality

B. Availability

C. Integrity

D. Non-repudiation

Answer: C


CAP practice exam

Renew CAP exam prep:

Q96. Which of the following is a temporary approval to operate based on an assessment of the implementation status of the assigned IA Controls?

A. IATT

B. ATO

C. IATO

D. DATO

Answer: C


Q97. Tracy is the project manager of the NLT Project for her company. The NLT Project is scheduled to last 14 months and has a budget at completion of $4,555,000. Tracy's organization will receive a bonus of $80,000 per day that the project is completed early up to $800,000. Tracy realizes that there are several opportunities within the project to save on time by crashing the project work.

Crashing the project is what type of risk response?

A. Mitigation

B. Exploit

C. Enhance

D. Transference

Answer: C


Q98. Which of the following NIST Special Publication documents provides a guideline on network security testing?

A. NIST SP 800-60

B. NIST SP 800-53A

C. NIST SP 800-37

D. NIST SP 800-42

E. NIST SP 800-59

F. NIST SP 800-53

Answer: D


Q99. Which of the following concepts represent the three fundamental principles of information security?

Each correct answer represents a complete solution. Choose three.

A. Privacy

B. Integrity

C. Availability

D. Confidentiality

Answer: BCD


Q100. Mary is the project manager for the BLB project. She has instructed the project team to assemble, to review the risks. She has included the schedule management plan as an input for the quantitative risk analysis process. Why is the schedule management plan needed for quantitative risk analysis?

A. Mary will utilize the schedule controls and the nature of the schedule for the quantitative analysis of the schedule.

B. Mary will schedule when the identified risks are likely to happen and affect the project schedule.

C. Mary will utilize the schedule controls to determine how risks may be allowed to change the project schedule.

D. Mary will use the schedule management plan to schedule the risk identification meetings throughout the remaining project.

Answer: A