Which of the following groups represents the most likely source of an asset loss through the inappropriate use
Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?
Which one of the following contract types is usually considered to be the most dangerous for the buyer?
You are the program manager for your project. You are working with the project managers regarding the procurement processes for their projects. You have ruled out one particular contract type because it is considered too risky for the program. Which one of the following contract types is usually considered to be the most dangerous for the buyer?
Which of the following risk processes is repeated after the plan risk responses to determine if the overall pr
You are the project manager of the NNN project for your company. You and the project team are working together to plan the risk responses for the project. You feel that the team has successfully completed the risk response planning and now you must initiate what risk process it is. Which of the following risk processes is repeated after the plan risk responses to determine if the overall project risk has been satisorily decreased?
What risk response has been given in this project?
Jane is the project manager of the GBB project for her company. In the current project a vendor has offered the project a ten percent discount based if they will order 100 units for the project. It is possible that the GBB Project may need the 100 units, but the cost of the units is not a top priority for the project. Jane documents the offer and tells the vendor that they will keep the offer in mind and continue with the project as planned. What risk response has been given in this project?
Which of the following participants are required in a NIACAP security assessment?
The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. Which of the following participants are required in a NIACAP security assessment?
Each correct answer represents a part of the solution. Choose all that apply.
What are the different categories of penetration testing?
Penetration tests are sometimes called white hat attacks because in a pen test, the good guys are attempting to break in. What are the different categories of penetration testing? Each correct answer represents a complete solution. Choose all that apply.
Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?
Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?
What type of analysis of the risks provides a quick and high-level review of each identified risk event?
You and your project team have identified the project risks and now are analyzing the probability and impact of the risks. What type of analysis of the risks provides a quick and high-level review of each identified risk event?
What type of risk response is Sam using?
Sam is the project manager of a construction project in south Florida. This area of the United States is prone to hurricanes during certain parts of the year. As part of the project plan Sam and the project team acknowledge the possibility of hurricanes and the damage the hurricane could have on the project’s deliverables, the schedule of the project, and the overall cost of the project. Once Sam and the project stakeholders acknowledge the risk of the hurricane they go on planning the project as if the risk is not likely to happen. What type of risk response is Sam using?
Which of the following techniques is NOT used as a tool in qualitative risk analysis process?
You work as a project manager for TechSoft Inc. You are working with the project stakeholders on the qualitative risk analysis process in your project. You have used all the tools to the qualitative risk analysis process in your project. Which of the following techniques is NOT used as a tool in qualitative risk analysis process?