Which of the following is the correct order of C&A phases in a DITSCAP assessment?
Certification and Accreditation (C&A or CnA) is a process for implementing information
security. Which of the following is the correct order of C&A phases in a DITSCAP
assessment?
What are the different phases of System Authorization Plan?
System Authorization is the risk management process. System Authorization Plan (SAP) is
a comprehensive and uniform approach to the System Authorization Process. What are the
different phases of System Authorization Plan? Each correct answer represents a part of
the solution. Choose all that apply.
Which of the following statements are true about Certification and Accreditation?
Certification and Accreditation (C&A or CnA) is a process for implementing information
security. It is a systematic procedure for evaluating, describing, testing, and authorizing
systems prior to or after a system is in operation. Which of the following statements are true
about Certification and Accreditation? Each correct answer represents a complete solution.
Choose two.
Which of the following requires all general support systems and major applications…?
Which of the following requires all general support systems and major applications to be
fully certified and accredited before these systems and applications are put into production?
Each correct answer represents a part of the solution. Choose all that apply.
What are the different types of NIACAP accreditation?
The National Information Assurance Certification and Accreditation Process (NIACAP) is the
minimum standard process for the certification and accreditation of computer and
telecommunications systems that handle U.S. national security information. What are the
different types of NIACAP accreditation? Each correct answer represents a complete
solution. Choose all that apply.
Which of the following are among the eight areas of IA defined by DoD?
According to U.S. Department of Defense (DoD) Instruction 8500.2, there are eight
Information Assurance (IA) areas, and the controls are referred to as IA controls. Which of
the following are among the eight areas of IA defined by DoD? Each correct answer
represents a complete solution. Choose all that apply.
Which of the following is a subset discipline of Corporate Governance focused on information security systems
Which of the following is a subset discipline of Corporate Governance focused on
information security systems and their performance and risk management?
Which one of the following statements is the most accurate about when project risk happens?
Ben is the project manager of the YHT Project for his company. Alice, one of his team
members, is confused about when project risks will happen in the project. Which one of the
following statements is the most accurate about when project risk happens?
What term is assigned to the low-level of stakeholder tolerance in this project?
You are the project manager of the NKJ Project for your company. The project’s success or
failure will have a significant impact on your organization’s profitability for the coming year.
Management has asked you to identify the risk events and communicate the event’s
probability and impact as early as possible in the project. Management wants to avoid risk
events and needs to analyze the cost-benefits of each risk event in this project. What term
is assigned to the low-level of stakeholder tolerance in this project?
Where can a project manager find risk-rating rules?
Where can a project manager find risk-rating rules?