Which one of the following is a valid risk response for…
There are seven risk responses for any project. Which one of the following is a valid risk response for a negative risk event?
Which of the following processes is described in the st…
Which of the following processes is described in the statement below?
“It is the process of implementing risk response plans, tracking identified risks, monitoring residual risk, identifying new risks, and evaluating risk process effectiveness throughout the project.”
Which of the following participants are required in a N…
The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. Which of the following participants are required in a NIACAP security assessment?
Each correct answer represents a part of the solution. Choose all that apply.
What are the procedures that must be defined for each s…
The Software Configuration Management (SCM) process defines the need to trace changes, and the ability to verify that the final delivered software has all of the planned enhancements that are supposed to be included in the release. What are the procedures that must be defined for each software project to ensure that a sound
SCM process is implemented?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following are included in the risk register?
You are the project manager for TTP project. You are in the Identify Risks process. You have to create the risk register. Which of the following are included in the risk register?
Each correct answer represents a complete solution. Choose two.
What are the different categories of penetration testing?
Penetration tests are sometimes called white hat attacks because in a pen test, the good guys are attempting to break in. What are the different categories of penetration testing?
Each correct answer represents a complete solution. Choose all that apply.
what risk response?
You are the project manager of the HJK project for your organization. You and the project team have created risk responses for many of the risk events in the project. A teaming agreement is an example of what risk response?
Which of the following are included in Technical Controls?
Which of the following are included in Technical Controls?
Each correct answer represents a complete solution. Choose all that apply.
What are the security management responsibilities?
Information Security management is a process of defining the security controls in order to protect information assets. What are the security management responsibilities?
Each correct answer represents a complete solution. Choose all that apply.
which of the following are likely to increase?
You work as a project manager for BlueWell Inc. There has been a delay in your project work that is adversely affecting the project schedule. You decided, with your stakeholders’ approval, to fast track the project work to
get the project done faster. When you fast track the project which of the following are likely to increase?