Which of the following is a 1996 United States federal law, designed to improve the way the federal government
Which of the following is a 1996 United States federal law, designed to improve the way the federal government acquires, uses, and disposes information technology?
Which of the following Internet laws has the credit card issuing company violated?
A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark’s financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?
What is the project’s schedule performance index?
You are the project manager of the NNH Project. In this project you have created a contingency response that the schedule performance index should be less than 0.93. The NHH Project has a budget at completion of $945,000 and is 45 percent complete though the project should be 49 percent complete. The project has spent $455,897 to reach the 45 percent complete milestone.
What is the project’s schedule performance index?
What component of the change control system communicates the approval or denial of a proposed change request?
Thomas is a key stakeholder in your project. Thomas has requested several changes to the project scope for the project you are managing. Upon review of the proposed changes, you have discovered that these new requirements are laden with risks and you recommend to the change control board that the changes be excluded from the project scope. The change control board agrees with you. What component of the change control system communicates the approval or denial of a proposed change request?
In which of the following phases of the DITSCAP process does Security Test and Evaluation (ST&E) occur?
In which of the following phases of the DITSCAP process does Security Test and Evaluation (ST&E) occur?
Which of the following roles is also known as the accreditor?
Which of the following roles is also known as the accreditor?
Which of the following DITSCAP phases validates that the preceding work has produced an IS that operates in a
Which of the following DITSCAP phases validates that the preceding work has produced an IS that operates in a specified computing environment?
Which of the following areas can be exploited in a penetration test?
Penetration testing (also called pen testing) is the practice of testing a computer system, network, or Web application to find vulnerabilities that an attacker could exploit. Which of the following areas can be exploited in a penetration test?
Each correct answer represents a complete solution. Choose all that apply.
you need to use the solution to pay for the internal solution in comparison to the vendor’s solution?
You are the project manager for your organization. You have identified a risk event you’re your organization could manage internally or externally. If you manage the event internally it will cost your project $578,000 and an additional $12,000 per month the solution is in use. A vendor can manage the risk event for you. The vendor will charge $550,000 and $14,500 per month that the solution is in use. How many months will you need to use the solution to pay for the internal solution in comparison to the vendor’s solution?
What type of risk response has Adrian used in this example?
Adrian is the project manager of the NHP Project. In her project there are several work packages that deal with electrical wiring. Rather than to manage the risk internally she has decided to hire a vendor to complete all work packages that deal with the electrical wiring. By removing the risk internally to a licensed electrician Adrian feels more comfortable with project team being safe.
What type of risk response has Adrian used in this example?
