Which one of the following statements best describes the requirements for the data type used in qualitative ri
You are the project manager of the CUL project in your organization. You and the project team are
assessing the risk events and creating a probability and impact matrix for the identified risks.
Which one of the following statements best describes the requirements for the data type used in
qualitative risk analysis?
Which of the following potential impact levels shows limited adverse effects on organizational operations, org
FIPS 199 defines the three levels of potential impact on organizations. Which of the following
potential impact levels shows limited adverse effects on organizational operations, organizational
assets, or individuals?
which of the following processes is known as the decomposition process of a verification system into Configura
You work as the senior project manager in SoftTech Inc. You are working on a software project
using configuration management. Through configuration management you are decomposing the
verification system into identifiable, understandable, manageable, traceable units that are known
as Configuration Items (CIs). According to you, which of the following processes is known as the
decomposition process of a verification system into Configuration Items?
What risk response has been enacted in this project?
Bill is the project manager of the JKH Project. He and the project team have identified a risk event
in the project with a high probability of occurrence and the risk event has a high cost impact on the
project. Bill discusses the risk event with Virginia, the primary project customer, and she decides
that the requirements surrounding the risk event should be removed from the project. The removal
of the requirements does affect the project scope, but it can release the project from the high risk
exposure. What risk response has been enacted in this project?
which of the following has she made?
Martha registers a domain named Microsoft.in. She tries to sell it to Microsoft Corporation. The
infringement of which of the following has she made?
Which of the following is a variant with regard to Configuration Management?
Which of the following is a variant with regard to Configuration Management?
What are the various Tier 1 activities?
The organization level is the Tier 1 and it addresses risks from an organizational perspective.
What are the various Tier 1 activities? Each correct answer represents a complete solution.
Choose all that apply.
Which of the following are the common roles with regard to data in an information classification program?
Which of the following are the common roles with regard to data in an information classification
program? Each correct answer represents a complete solution. Choose all that apply.
Which of the following life cycle modeling activities establishes service relationships and message exchange p
Which of the following life cycle modeling activities establishes service relationships and message
exchange paths?
Which of the following refers to the above mentioned condition?
You have a storage media with some data and you make efforts to remove this data. After
performing this, you analyze that the data remains present on the media. Which of the following
refers to the above mentioned condition?