Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
 

ISC CAP Exam Actual Questions

The questions for CAP were last updated on Nov. 21, 2024.
  • Viewing page 1 out of 40 pages.
  • Viewing questions 1-10 out of 395 questions

Topic 1 - Single Topic

Question #1 Topic 1

Which of the following professionals plays the role of a monitor and takes part in the organization's configuration management process?

  • A. Senior Agency Information Security Officer
  • B. Authorizing Official
  • C. Common Control Provider
  • D. Chief Information Officer
Reveal Solution Hide Solution   Discussion   2

Correct Answer: C 🗳️

Question #2 Topic 1

The Chief Information Officer (CIO), or Information Technology (IT) director, is a job title commonly given to the most senior executive in an enterprise. What are the responsibilities of a Chief Information Officer?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Preserving high-level communications and working group relationships in an organization
  • B. Facilitating the sharing of security risk-related information among authorizing officials
  • C. Establishing effective continuous monitoring program for the organization
  • D. Proposing the information technology needed by an enterprise to achieve its goals and then working within a budget to implement the plan
Reveal Solution Hide Solution   Discussion   5

Correct Answer: ACD 🗳️

Question #3 Topic 1

The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the role of a supporter and advisor, respectively. Which of the following statements are true about ISSO and ISSE?
Each correct answer represents a complete solution. Choose all that apply.

  • A. An ISSE provides advice on the impacts of system changes.
  • B. An ISSE manages the security of the information system that is slated for Certification & Accreditation (C&A).
  • C. An ISSO manages the security of the information system that is slated for Certification & Accreditation (C&A).
  • D. An ISSO takes part in the development activities that are required to implement system changes.
  • E. An ISSE provides advice on the continuous monitoring of the information system.
Reveal Solution Hide Solution   Discussion   2

Correct Answer: ACE 🗳️

Question #4 Topic 1

Which of the following professionals is responsible for starting the Certification & Accreditation (C&A) process?

  • A. Information system owner
  • B. Authorizing Official
  • C. Chief Risk Officer (CRO)
  • D. Chief Information Officer (CIO)
Reveal Solution Hide Solution   Discussion   1

Correct Answer: A 🗳️

Question #5 Topic 1

Which of the following assessment methodologies defines a six-step technical security evaluation?

  • A. FITSAF
  • B. FIPS 102
  • C. OCTAVE
  • D. DITSCAP
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️

Question #6 Topic 1

DIACAP applies to the acquisition, operation, and sustainment of any DoD system that collects, stores, transmits, or processes unclassified or classified information since December 1997. What phases are identified by DIACAP?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Accreditation
  • B. Identification
  • C. System Definition
  • D. Verification
  • E. Validation
  • F. Re-Accreditation
Reveal Solution Hide Solution   Discussion   3

Correct Answer: CDEF 🗳️

Question #7 Topic 1

Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?

  • A. Mandatory Access Control
  • B. Role-Based Access Control
  • C. Discretionary Access Control
  • D. Policy Access Control
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️

Question #8 Topic 1

Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?

  • A. FITSAF
  • B. FIPS
  • C. TCSEC
  • D. SSAA
Reveal Solution Hide Solution   Discussion  

Correct Answer: D 🗳️

Question #9 Topic 1

James work as an IT systems personnel in SoftTech Inc. He performs the following tasks:
Runs regular backups and routine tests of the validity of the backup data.
Performs data restoration from the backups whenever required.
Maintains the retained records in accordance with the established information classification policy.
What is the role played by James in the organization?

  • A. Manager
  • B. Owner
  • C. Custodian
  • D. User
Reveal Solution Hide Solution   Discussion  

Correct Answer: C 🗳️

Question #10 Topic 1

FITSAF stands for Federal Information Technology Security Assessment Framework. It is a methodology for assessing the security of information systems. Which of the following FITSAF levels shows that the procedures and controls have been implemented?

  • A. Level 4
  • B. Level 1
  • C. Level 3
  • D. Level 5
  • E. Level 2
Reveal Solution Hide Solution   Discussion  

Correct Answer: C 🗳️

Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...