SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
risk analysis
performance monitor
network mapping
integrity
2. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
FRAP
CobiT
mappers
administrative
3. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
vulnerability scanner
delayed
protocol analyzer
administrative
4. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
L0phtCrack
Information Technology Infrastructure Library (ITIL)
vulnerability
annualized rate of occurrence
5. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
mappers
CobiT
penetration
risk mitigation
6. Assurance of accurancy and reliability of information and systems
integrity
threat
BS7799
risk catagories
7. The tools - personnel and business processes necessary to ensure that security meets needs
usage
security governanace
countermeasure
ISO 17799
8. Strategic - tactical and operational planning
planning horizon
operational
exposure
usage
9. Tools to ID - develop - and design security requirements for business needs
SP 800-30
ISO 17799
vulnerability scanner
blueprints
10. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
confidentiality
risk anlysis
AS/NZS 4360
ISO/IEC 27004
11. Used to ID failures in a complex systems to understand underlying causes of threats
ISO/IEC 27005
fault tree analysis
FMEA
firewall
12. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
administrative
risk analysis
CobiT
administrative
13. FRAP
technical
FMEA
annualized loss expectancy
Facilitated Risk Analysis Process
14. OCTAVE
CobiT
CobiT
network mapping
Operationally Critical Threat - Asset - and Vulnerability Evaluation
15. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
FMEA
single loss expectancy
SP 800-30
CobiT
16. Guide to illustrate how to protect personal health information
Information risk management
escalation
corporate security officer
ISO/IEC 27799
17. NIST risk management methodology
Information Technology Infrastructure Library (ITIL)
Control Objectives for Information and related Technology
SP 800-30
administrative
18. De facto standard of best practices for IT service mgmt
Failure Modes and Effect Analysis
vulnerability
Information Technology Infrastructure Library (ITIL)
exposure factor
19. Corporate governance at the strategic level
COSO
Information Security Management
privilege
ITIL
20. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
mappers
Information risk management
vulnerability
risk anlysis
21. Derived from the COSO framework
exposure
privilege
BS7799
CobiT
22. A log that can record outgoing requests - incoming traffic - and internet usage
COSO
countermeasure
vulnerability scanner
firewall
23. Risk mgmt method with much broader focus than IT security
due care
annualized loss expectancy
CobiT
AS/NZS 4360
24. ISM Standard
Information Security Management
privilege
blueprints
planning horizon
25. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
security governanace
operational
ISO/IEC 27004
port scanner
26. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
qualitative
FMEA
Information risk management
port scanner
27. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
vulnerability
availability
vulnerability
OCTAVE
28. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
security governanace
ISO/IEC 27002
Information Technology Infrastructure Library (ITIL)
integrity
29. An instance of being exposed to losses from a threat
AS/NZS 4360
L0phtCrack
FMEA
exposure
30. Type of audit that checks that accounts - groups and roles are correctly assigned
network mapping
threat
CISO
privilege
31. The likelihood of exploitation and the loss potential
risk analysis
chief information security officer
risk mitigation
risk
32. Focus on service level agreements between IT dept and internal customers
escalation
BS7799
ITIL
COSO
33. Possiblity of damage and the ramifications should it occur
risk
operational
privilege
FMEA
34. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
security officer
CISO
availability
CobiT
35. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
penetration
tactical
FMEA
risk analysis
36. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
administrative
Control Objectives for Information and related Technology
CobiT
exposure factor
37. An open language from mitre.org for determining vulnerabilities and problems on computer systems
ISO/IEC 27001
OVAL
network mapping
integrity
38. Midterm goals
data owner
risk
tactical
administrative
39. Collection of controls an organization must have in place
CobiT
elcomsoft
IRM
security program
40. Guide assist in the implemenation of information security based on risk managent approach
Information Security Management
ISO/IEC 27005
CobiT
vulnerability
41. CSO
ISO/IEC 27004
ISO/IEC 27002
annualized rate of occurrence
corporate security officer
42. Responsible for communicating to senior mgmt organizational risks and compliance regulations
technical
vulnerability scanner
risk analysis
CISO
43. Made up of ten domains - a mechanism to describe security processes
AS/NZS 4360
blueprints
No events - Errors only - Errors and warnings - All events
ISO 17799
44. Percentage of an asset's value that would be lost in a single incident - (EF)
operational
technical
exposure factor
FRAP
45. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
COSO
availability
performance monitor
risk
46. Ensures managment security directives are fulfilled
CobiT
blueprints
security officer
port scanner
47. Type of audit that checks procedures and policies for escalating issues to management
risk anlysis
COSO
OCTAVE
escalation
48. Ensures reliable timely access to data/resources to authorized individuals
availability
risk mitigation
Information risk management
delayed
49. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
BS7799
exposure factor
risk catagories
Information risk management
50. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
ISO 17799
Facilitated Risk Analysis Process
security governanace
mappers