100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

CAP TEST B QUESTIONS AND ANSWERS

Puntuación
-
Vendido
-
Páginas
21
Grado
A+
Subido en
04-11-2025
Escrito en
2025/2026

CAP TEST B QUESTIONS AND ANSWERS Which of the following documents is mostly used in RMF step 5? - CORRECT ANSWERNIST SP 800 37 SDLC stands for Systems Development Life Cycle (SDLC). Which of the following are documented to provide utility in the SDLC guideline? - CORRECT ANSWER•Insight into the major activities and milestones •Decision points or control gates •Specified outputs that provide vital information into the system design •Project accomplishments •System maintenance, security, and operational considerations

Mostrar más Leer menos
Institución
CAP
Grado
CAP










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CAP
Grado
CAP

Información del documento

Subido en
4 de noviembre de 2025
Número de páginas
21
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CAP TEST B QUESTIONS AND ANSWERS
Which of the following documents is mostly used in RMF step 5? - CORRECT ANSWER✅✅NIST SP 800-
37



SDLC stands for Systems Development Life Cycle (SDLC). Which of the following are documented to
provide utility in the SDLC guideline? - CORRECT ANSWER✅✅•Insight into the major activities and
milestones

•Decision points or control gates

•Specified outputs that provide vital information into the system design

•Project accomplishments

•System maintenance, security, and operational considerations



Which of the following tasks are performed by the information custodian? - CORRECT ANSWER✅✅•He
performs data restoration from the backups whenever required.

•He runs regular backups and routinely tests the validity of the backup data.

•He maintains the retained records in accordance with the established information classification policy.

•He administers the classification scheme occasionally.



Which of the following are responsibilities of an information system owner (ISO)? - CORRECT
ANSWER✅✅•Maintains the system security plan and ensures that the system is deployed

•Assists in the identification, implementation, and assessment of the common security controls

•Updates the system security plan whenever a significant change occurs



Which of the following statements about the availability concept of information security management is
true? - CORRECT ANSWER✅✅It ensures reliable and timely access to resources.



Vulnerability discovery is used to deal with the identification of vulnerabilities, which include the
following methods: - CORRECT ANSWER✅✅Dynamic code analysis is used to assess applications for
vulnerabilities that might be exploited from an application user's perspective.

•Network vulnerability scanning is used to probe operating systems, databases, and firewalls, which
prevent all deployed information technology services from vulnerabilities that are accessible from the
Internet.

,•Security health checking is used to check systems with scripts and assess the configurations of local and
network services of operating systems, databases, middleware packages, and applications for bugs that
could lead to potentially exploitable vulnerabilities.



Which of the following DoD directives refers to the Defense Information Management (IM) Program? -
CORRECT ANSWER✅✅DoDD 8000.1: This DoD directive refers to the 'Defense Information
Management (IM) Program'.



Which of the following is an authorization of a DoD information system to process, store, or transmit
information? - CORRECT ANSWER✅✅Approval to Operate (ATO) is an authorization of a DoD
information system to process, store, or transmit information.



Which of the following governance bodies directs and coordinates implementations of the information
security program? - CORRECT ANSWER✅✅The chief information security officer (CISO) directs and
coordinates implementations of the information security program.



Describe Passive and Active acceptance responses - CORRECT ANSWER✅✅•Passive acceptance: It is a
strategy in which no plans are made to avoid or mitigate the risk.

•Active acceptance: Such responses include developing contingency reserves to deal with risks in case
they occur.



Jason works as a senior organizational official in uCertify Inc. He wants to create new corporate policies.
Which of the following key points should he keep in mind while accomplishing his task? - CORRECT
ANSWER✅✅•Be clear and unambiguous

◦Legal and Regulatory obligations

◦Responsibilities (Ownership)

•Strategic approach

◦Adherence to standards

◦Use of common methods

•Approach to Risk Management

•Scope

◦Business Processes

◦Technology

, ◦Physical Security

•Action in the event of Policy Breach



Which of the following recovery plans includes specific strategies and actions to deal with specific
variances to assumptions resulting in a particular security problem, emergency, or state of affairs? -
CORRECT ANSWER✅✅A contingency plan is a plan devised for a specific situation when things could go
wrong. Contingency plans include specific strategies and actions to deal with specific variances to
assumptions resulting in a particular problem, emergency, or state of affairs. They also include a
monitoring process and triggers for initiating planned actions.



Choose and reorder the required levels of FITSAF based on SEI's Capability Maturity Model (CMM). -
CORRECT ANSWER✅✅•Level 1: The first level reflects that an asset has documented a security policy.

•Level 2: The second level shows that the asset has documented procedures and controls to implement
the policy.

• Level 3: The third level indicates that these procedures and controls have been implemented.

•Level 4: The fourth level shows that the procedures and controls are tested and reviewed.

•Level 5: The fifth level is the final level and shows that the asset has procedures and controls fully
integrated into a comprehensive program.



An Authorizing Official plays the role of an approver. What are the responsibilities of an Authorizing
Official? - CORRECT ANSWER✅✅•Ascertains the security posture of the organization's information
system.

•Reviews security status reports and critical security documents.

•Determines the requirement of reauthorization and reauthorizes information systems when required.



Which of the following steps come under the IT contingency planning process? - CORRECT
ANSWER✅✅Step 1: Develop contingency planning policy statements

Step 2: Conduct business impact analysis

Step 3: Identify preventative controls

Step 4: Develop recovery strategies

Step 5: Develop contingency plans

Step 6: Planning, testing, training, and exercises
$12.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
STANGRADES Stanford University
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
51
Miembro desde
1 año
Número de seguidores
1
Documentos
10091
Última venta
2 días hace
STAN-GRADES

EXCELLENCY IN ACADEMIC MATERIALS

3.4

11 reseñas

5
4
4
1
3
3
2
1
1
2

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes