1.
Which of the following types of evidence is considered as the best evidence?
2.
Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?
3.
Which of the following analysis provides a foundation for measuring investment of time, money and human resources required to achieve a particular outcome?
 
4.
A contract cannot have provisions for which one of the following?
5.
You work as a security manager for SoftTech Inc. You are conducting a security awareness campaign for your employees. One of the employees of your organization asks you the purpose of the security awareness, training and education program. What will be your answer?
6.
You are responsible for network and information security at a metropolitan police station. The most important concern is that unauthorized parties are not able to access data. What is this called?
7.
What component of the change management system is responsible for evaluating, testing, and documenting changes created to the project scope?
8.
What is a stakeholder analysis chart?
9.
Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?
10.
You are a project manager of a large construction project. Within the project you are working with several vendors to complete different phases of the construction. Your client has asked that you arrange for some of the materials a vendor is to install next week in the project to be changed. According to the change management plan what subsystem will need to manage this change request?