SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Assurance of accurancy and reliability of information and systems
integrity
ISO/IEC 27004
tactical
security governanace
2. Used to ID failures in a complex systems to understand underlying causes of threats
fault tree analysis
strategic
planning horizon
ISO/IEC 27002
3. Expected or predetermined performance level - developed from policy - performance - requirements
Committee of Sponsoring Organizations
performance baseline
L0phtCrack
risk anlysis
4. Event levels available for logging in a MS DNS server
No events - Errors only - Errors and warnings - All events
security officer
Information risk management
performance baseline
5. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
Facilitated Risk Analysis Process
COSO
data owner
OVAL
6. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
ITIL
vulnerability
threat
confidentiality
7. ISM Standard
Information Security Management
planning horizon
ISO/IEC 27001
exposure
8. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
due care
CISO
network mapping
Failure Modes and Effect Analysis
9. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
FRAP
fault tree analysis
vulnerability
risk catagories
10. Ensures necessary level of secrecy and prevents unauthorized disclosure
confidentiality
corporate security officer
annualized loss expectancy
physical
11. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
security program
CISO
data owner
SP 800-30
12. IRM
CobiT
COSO
ISO/IEC 27004
Information risk management
13. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
delayed
risk
port scanner
physical
14. Type of audit that checks that network resources - systems and software are used appropriately
usage
Information Security Management
penetration
FMEA
15. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
Operationally Critical Threat - Asset - and Vulnerability Evaluation
CobiT
Information risk management
IRM
16. A log that can record outgoing requests - incoming traffic - and internet usage
qualitative
annualized loss expectancy
firewall
strategic
17. An instance of being exposed to losses from a threat
ISO/IEC 27005
security officer
integrity
exposure
18. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
administrative
protocol analyzer
privilege
Control Objectives for Information and related Technology
19. CSO
L0phtCrack
john the ripper
blueprints
corporate security officer
20. OCTAVE
CobiT
privilege
risk
Operationally Critical Threat - Asset - and Vulnerability Evaluation
21. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
ISO/IEC 27002
ISO 17799
L0phtCrack
Information Technology Infrastructure Library (ITIL)
22. FMEA
delayed
qualitative
Failure Modes and Effect Analysis
Facilitated Risk Analysis Process
23. Collection of controls an organization must have in place
corporate security officer
security program
exposure
annualized loss expectancy
24. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
ISO/IEC 27001
security program
ISO/IEC 27005
security governanace
25. Focus on service level agreements between IT dept and internal customers
elcomsoft
ITIL
CobiT
vulnerability
26. An open language from mitre.org for determining vulnerabilities and problems on computer systems
security program
SP 800-30
penetration
OVAL
27. SLE x ARO - (ALE)
Failure Modes and Effect Analysis
firewall
risk
annualized loss expectancy
28. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
FMEA
elcomsoft
CobiT
physical
29. Derived from the COSO framework
risk
vulnerability
Control Objectives for Information and related Technology
CobiT
30. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
FMEA
COSO
single loss expectancy
L0phtCrack
31. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
availability
usage
mappers
protocol analyzer
32. Daily goals focused on productivity and task-oriented activities
ISO/IEC 27001
fault tree analysis
operational
chief information security officer
33. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
risk
network mapping
security governanace
Control Objectives for Information and related Technology
34. De facto standard of best practices for IT service mgmt
Information Technology Infrastructure Library (ITIL)
CobiT
port scanner
AS/NZS 4360
35. Corporate governance at the strategic level
ITIL
Information Security Management
COSO
FRAP
36. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
CISO
exposure
port scanner
strategic
37. COSO
risk mitigation
Committee of Sponsoring Organizations
vulnerability
risk analysis
38. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
BS7799
network mapping
port scanner
annualized loss expectancy
39. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
COSO
ISO 17799
risk analysis
vulnerability
40. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
FRAP
ISO/IEC 27005
CISO
IRM
41. The likelihood of exploitation and the loss potential
CISO
risk
COSO
availability
42. The tools - personnel and business processes necessary to ensure that security meets needs
COSO
security governanace
Information Security Management
single loss expectancy
43. Responsible for information classification and protection
ISO/IEC 27002
data owner
escalation
security governanace
44. Guide to illustrate how to protect personal health information
Operationally Critical Threat - Asset - and Vulnerability Evaluation
penetration
ISO/IEC 27799
vulnerability
45. __________ loss has a negative effect after a vulnerability is initially exploited
administrative
security program
delayed
operational
46. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
Control Objectives for Information and related Technology
vulnerability scanner
risk anlysis
port scanner
47. Strategic - tactical and operational planning
exposure
firewall
planning horizon
penetration
48. Information security managment measurements
ISO/IEC 27004
Operationally Critical Threat - Asset - and Vulnerability Evaluation
administrative
fault tree analysis
49. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
Information Technology Infrastructure Library (ITIL)
CobiT
BS7799
due care
50. Midterm goals
tactical
usage
COSO
security program