What document is Frank and the NHH Project team creating in this scenario?
Frank is the project manager of the NHH Project. He is working with the project team to
create a plan to document the procedures to manage risks throughout the project. This
document will define how risks will be identified and quantified. It will also define how
contingency plans will be implemented by the project team. What document is Frank and
the NHH Project team creating in this scenario?
Which of the following DITSCAP phases validates that the preceding work has produced an IS that operates in a
Which of the following DITSCAP phases validates that the preceding work has produced an
IS that operates in a specified computing environment?
which of the following testing methodologies do assessors use all available…?
In which of the following testing methodologies do assessors use all available
documentation and work under no constraints, and attempt to circumvent the security
features of an information system?
Which of the following techniques are used after a security breach and are intended to limit the extent of any
Which of the following techniques are used after a security breach and are intended to limit
the extent of any damage caused by the incident?
Which of the following roles is also known as the accreditor?
Which of the following roles is also known as the accreditor?
which of the following phases of the DITSCAP process does Security Test and Evaluation (ST&E) occur?
In which of the following phases of the DITSCAP process does Security Test and Evaluation
(ST&E) occur?
Which one of the following is NOT an output of the risk response planning?
You are the project manager of the NHH project for your company. You have completed the
first round of risk management planning and have created four outputs of the risk response
planning process. Which one of the following is NOT an output of the risk response
planning?
What component of the change control system communicates the approval or denial of a proposed change request?
Thomas is a key stakeholder in your project. Thomas has requested several changes to the
project scope for the project you are managing. Upon review of the proposed changes, you
have discovered that these new requirements are laden with risks and you recommend to
the change control board that the changes be excluded from the project scope. The change
control board agrees with you. What component of the change control system
communicates the approval or denial of a proposed change request?
What is the project’s schedule performance index?
You are the project manager of the NNH Project. In this project you have created a
contingency response that the schedule performance index should be less than 0.93. The
NHH Project has a budget at completion of $945,000 and is 45 percent complete though the
project should be 49 percent complete. The project has spent $455,897 to reach the 45
percent complete milestone. What is the project’s schedule performance index?
Which of the following Internet laws has the credit card issuing company violated?
A Web-based credit card company had collected financial and personal details of Mark
before issuing him a credit card. The company has now provided Mark’s financial and
personal details to another company. Which of the following Internet laws has the credit
card issuing company violated?