SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. __________ loss has a negative effect after a vulnerability is initially exploited
delayed
elcomsoft
operational
Committee of Sponsoring Organizations
2. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
Information Technology Infrastructure Library (ITIL)
security governanace
ISO 17799
CobiT
3. Ensures managment security directives are fulfilled
COSO
exposure factor
penetration
security officer
4. CISO
chief information security officer
CobiT
annualized rate of occurrence
ISO/IEC 27002
5. Provides a cost/benefit comparision
Committee of Sponsoring Organizations
CobiT
risk analysis
threat
6. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
Information Technology Infrastructure Library (ITIL)
SP 800-30
penetration
vulnerability
7. Tools to ID - develop - and design security requirements for business needs
CobiT
exposure
blueprints
FMEA
8. An open language from mitre.org for determining vulnerabilities and problems on computer systems
OVAL
vulnerability
CobiT
COSO
9. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
COSO
risk mitigation
ISO 17799
risk analysis
10. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
operational
ISO 17799
administrative
IRM
11. Daily goals focused on productivity and task-oriented activities
exposure
operational
ITIL
countermeasure
12. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
risk anlysis
integrity
IRM
administrative
13. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
COSO
AS/NZS 4360
delayed
ISO/IEC 27002
14. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
Information Technology Infrastructure Library (ITIL)
risk anlysis
COSO
network mapping
15. NIST risk management methodology
availability
planning horizon
port scanner
SP 800-30
16. Guide to illustrate how to protect personal health information
risk anlysis
ISO 17799
risk mitigation
ISO/IEC 27799
17. Midterm goals
privilege
Control Objectives for Information and related Technology
tactical
countermeasure
18. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
protocol analyzer
OCTAVE
risk
due care
19. Possiblity of damage and the ramifications should it occur
Information risk management
escalation
planning horizon
risk
20. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
BS7799
L0phtCrack
data owner
usage
21. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
performance monitor
firewall
CobiT
CISO
22. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
FMEA
privilege
firewall
Failure Modes and Effect Analysis
23. Guide assist in the implemenation of information security based on risk managent approach
ISO/IEC 27001
ISO/IEC 27005
Control Objectives for Information and related Technology
exposure factor
24. Ensures reliable timely access to data/resources to authorized individuals
availability
network mapping
BS7799
threat
25. IT governance at the operational level
blueprints
usage
mappers
CobiT
26. Potential danger to information or systems
usage
FRAP
exposure factor
threat
27. Used to ID failures in a complex systems to understand underlying causes of threats
CISO
fault tree analysis
Operationally Critical Threat - Asset - and Vulnerability Evaluation
technical
28. Responsible for information classification and protection
FMEA
confidentiality
vulnerability
data owner
29. Number of time the incident might occur annually - (ARO)
planning horizon
john the ripper
annualized rate of occurrence
risk mitigation
30. Type of audit that checks information classification and change control procedures
mappers
administrative
security program
CobiT
31. Event levels available for logging in a MS DNS server
No events - Errors only - Errors and warnings - All events
threat
ISO/IEC 27799
CobiT
32. Corporate governance at the strategic level
confidentiality
exposure factor
COSO
administrative
33. Strategic - tactical and operational planning
usage
IRM
planning horizon
strategic
34. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
COSO
OCTAVE
elcomsoft
firewall
35. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
ISO/IEC 27004
vulnerability
qualitative
CobiT
36. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
fault tree analysis
ISO/IEC 27005
blueprints
COSO
37. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
risk analysis
network mapping
countermeasure
annualized rate of occurrence
38. Made up of ten domains - a mechanism to describe security processes
operational
chief information security officer
Information Security Management
ISO 17799
39. CSO
corporate security officer
chief information security officer
COSO
Information Technology Infrastructure Library (ITIL)
40. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
Facilitated Risk Analysis Process
performance monitor
security program
integrity
41. OCTAVE
exposure factor
Operationally Critical Threat - Asset - and Vulnerability Evaluation
exposure
risk mitigation
42. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
corporate security officer
security officer
physical
CobiT
43. COSO
Committee of Sponsoring Organizations
Information risk management
escalation
operational
44. Derived from the COSO framework
annualized rate of occurrence
countermeasure
CobiT
due care
45. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
john the ripper
ISO/IEC 27001
vulnerability scanner
risk analysis
46. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
ISO/IEC 27002
risk mitigation
risk analysis
mappers
47. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
qualitative
FMEA
mappers
ISO/IEC 27001
48. The likelihood of exploitation and the loss potential
ITIL
risk
ISO/IEC 27001
availability
49. De facto standard of best practices for IT service mgmt
BS7799
Information Technology Infrastructure Library (ITIL)
administrative
FRAP
50. Type of audit that checks procedures and policies for escalating issues to management
CobiT
escalation
physical
elcomsoft
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests