Exam information

Exam CAP: Certified Authorization Professional (update December 11th, 2016)

Which of the following professionals plays the role of a monitor and takes part in the organization’s configuration management process?


Which of the following professionals plays the role of a monitor and takes part in theorganization’s configuration management process?

What are the responsibilities of a Chief Information Officer?

The Chief Information Officer (CIO), or Information Technology (IT) director, is a job titlecommonly given to the most senior executive in an enterprise. What are the responsibilitiesof a Chief Information Officer? Each correct answer represents a complete solution. Chooseall that apply.

Which of the following statements are true about ISSO and ISSE?

The Information System Security Officer (ISSO) and Information System Security Engineer(ISSE) play the role of a supporter and advisor, respectively. Which of the followingstatements are true about ISSO and ISSE? Each correct answer represents a completesolution. Choose all that apply.

Which of the following professionals is responsible for starting the Certification & Accreditation (C&A) process?

Which of the following professionals is responsible for starting the Certification &Accreditation (C&A) process?

Which of the following assessment methodologies defines a six-step technical security evaluation?

Which of the following assessment methodologies defines a six-step technical securityevaluation?


What phases are identified by DIACAP?

DIACAP applies to the acquisition, operation, and sustainment of any DoD system thatcollects, stores, transmits, or processes unclassified or classified information sinceDecember 1997. What phases are identified by DIACAP? Each correct answer represents acomplete solution. Choose all that apply.

Which of the following access control models will he use?

Mark works as a Network Administrator for NetTech Inc. He wants users to access onlythose resources that are required for them. Which of the following access control modelswill he use?

Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?

Which of the following refers to an information security document that is used in the UnitedStates Department of Defense (DoD) to describe and accredit networks and systems?

What is the role played by James in the organization?

James work as an IT systems personnel in SoftTech Inc. He performs the following tasks:Runs regular backups and routine tests of the validity of the backup data. Performs datarestoration from the backups whenever required. Maintains the retained records inaccordance with the established […]

Which of the following FITSAF levels shows that the procedures and controls have been implemented?

FITSAF stands for Federal Information Technology Security Assessment Framework. It is amethodology for assessing the security of information systems. Which of the followingFITSAF levels shows that the procedures and controls have been implemented?



Page 1 of 3312345...102030...Last »