What type of risk response have you elected to use in this instance?
You are the project manager for GHY Project and are working to create a risk response for a
negative risk. You and the project team have identified the risk that the project may not complete
on time, as required by the management, due to the creation of the user guide for the software
you’re creating. You have elected to hire an external writer in order to satisfy the requirements and
to alleviate the risk event. What type of risk response have you elected to use in this instance?
Which of the following organizations assists the President in overseeing the preparation of the federal budget
Which of the following organizations assists the President in overseeing the preparation of the
federal budget and to supervise its administration in Executive Branch agencies?
which one?
Part of your change management plan details what should happen in the change control system
for your project. Theresa, a junior project manager, asks what the configuration management
activities are for scope changes. You tell her that all of the following are valid configuration
management activities except for which one?
which an attacker can get physical control of a machine, insert unauthorized software, and alter data?
Which of the following types of redundancy prevents attacks in which an attacker can get physical
control of a machine, insert unauthorized software, and alter data?
Which of the following individuals inspects whether the security policies, standards, guidelines, and procedur
Which of the following individuals inspects whether the security policies, standards, guidelines,
and procedures are efficiently performed in accordance with the company’s stated security
objectives?
Which of the following process areas does the SSE-CMM define in the ‘Project and Organizational Practice
Which of the following process areas does the SSE-CMM define in the ‘Project and Organizational
Practices’ category? Each correct answer represents a complete solution. Choose all that apply.
Which of the following processes does the risk assessment step include?
The LeGrand Vulnerability-Oriented Risk Management method is based on vulnerability analysis
and consists of four principle steps. Which of the following processes does the risk assessment
step include? Each correct answer represents a part of the solution. Choose all that apply.
What features will you recommend?
You work as a Security Manager for Tech Perfect Inc. You have set up a SIEM server for the
following purposes: Analyze the data from different log sources Correlate the events among the
log entries Identify and prioritize significant events Initiate responses to events if required One of
your log monitoring staff wants to know the features of SIEM product that will help them in these
purposes. What features will you recommend? Each correct answer represents a complete
solution. Choose all that apply.
Which of the following are among the eight areas of IA defined by DoD?
According to U.S. Department of Defense (DoD) Instruction 8500.2, there are eight Information
Assurance (IA) areas, and the controls are referred to as IA controls. Which of the following are
among the eight areas of IA defined by DoD? Each correct answer represents a complete solution.
Choose all that apply.
Which of the following statements are true about ISSO and ISSE?
The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE)
play the role of a supporter and advisor, respectively. Which of the following statements are true
about ISSO and ISSE? Each correct answer represents a complete solution. Choose all that
apply.