SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
risk anlysis
tactical
CISO
ITIL
2. Possiblity of damage and the ramifications should it occur
CobiT
threat
ITIL
risk
3. Midterm goals
tactical
privilege
Facilitated Risk Analysis Process
john the ripper
4. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
ISO/IEC 27002
qualitative
annualized loss expectancy
risk mitigation
5. IT governance at the operational level
CobiT
risk
FMEA
single loss expectancy
6. Event levels available for logging in a MS DNS server
Facilitated Risk Analysis Process
john the ripper
No events - Errors only - Errors and warnings - All events
COSO
7. Assurance of accurancy and reliability of information and systems
FMEA
ISO 17799
No events - Errors only - Errors and warnings - All events
integrity
8. FMEA
escalation
No events - Errors only - Errors and warnings - All events
planning horizon
Failure Modes and Effect Analysis
9. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
performance baseline
vulnerability
CISO
IRM
10. Type of audit that checks procedures and policies for escalating issues to management
vulnerability scanner
escalation
physical
network mapping
11. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
elcomsoft
SP 800-30
ISO 17799
CISO
12. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
FMEA
countermeasure
john the ripper
qualitative
13. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
vulnerability
vulnerability
ISO 17799
IRM
14. De facto standard of best practices for IT service mgmt
risk
Information Technology Infrastructure Library (ITIL)
chief information security officer
risk analysis
15. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
CobiT
qualitative
risk analysis
ISO/IEC 27001
16. __________ loss has a negative effect after a vulnerability is initially exploited
risk analysis
delayed
physical
tactical
17. CobiT
risk anlysis
security governanace
firewall
Control Objectives for Information and related Technology
18. Responsible for information classification and protection
usage
technical
ISO 17799
data owner
19. Tools to ID - develop - and design security requirements for business needs
blueprints
firewall
Committee of Sponsoring Organizations
chief information security officer
20. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
penetration
ISO/IEC 27004
annualized loss expectancy
physical
21. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
penetration
due care
IRM
OCTAVE
22. A weakness (software - hardware - procedural - human) that can be exploited
risk
vulnerability
Information Technology Infrastructure Library (ITIL)
Information risk management
23. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
CobiT
strategic
COSO
annualized loss expectancy
24. Mitigates a potential risk
ISO/IEC 27002
ITIL
performance monitor
countermeasure
25. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
security program
planning horizon
protocol analyzer
blueprints
26. Ensures necessary level of secrecy and prevents unauthorized disclosure
administrative
confidentiality
ISO 17799
port scanner
27. Ensures managment security directives are fulfilled
Failure Modes and Effect Analysis
security officer
single loss expectancy
CobiT
28. IRM
security program
tactical
COSO
Information risk management
29. Type of audit that checks that network resources - systems and software are used appropriately
SP 800-30
Information Security Management
usage
operational
30. Ensures reliable timely access to data/resources to authorized individuals
CobiT
availability
Information risk management
FMEA
31. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
security officer
strategic
FMEA
ISO/IEC 27002
32. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
single loss expectancy
firewall
annualized loss expectancy
CobiT
33. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
physical
exposure factor
chief information security officer
vulnerability scanner
34. Risk mgmt method with much broader focus than IT security
fault tree analysis
AS/NZS 4360
performance monitor
chief information security officer
35. Type of audit that checks information classification and change control procedures
blueprints
john the ripper
administrative
vulnerability scanner
36. OCTAVE
qualitative
Operationally Critical Threat - Asset - and Vulnerability Evaluation
ISO/IEC 27002
ISO/IEC 27799
37. The asset's value multiplied by the EF percentage - (SLE)
single loss expectancy
mappers
availability
security governanace
38. Number of time the incident might occur annually - (ARO)
ISO/IEC 27799
annualized rate of occurrence
penetration
security program
39. Focus on service level agreements between IT dept and internal customers
ITIL
physical
Information risk management
CISO
40. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
ISO/IEC 27799
COSO
Facilitated Risk Analysis Process
network mapping
41. Potential danger to information or systems
delayed
risk
network mapping
threat
42. The likelihood of exploitation and the loss potential
risk
BS7799
port scanner
risk catagories
43. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
FMEA
CobiT
ISO/IEC 27004
firewall
44. Used to ID failures in a complex systems to understand underlying causes of threats
planning horizon
risk anlysis
fault tree analysis
exposure
45. An open language from mitre.org for determining vulnerabilities and problems on computer systems
performance baseline
OVAL
exposure factor
Operationally Critical Threat - Asset - and Vulnerability Evaluation
46. Type of audit that checks that accounts - groups and roles are correctly assigned
annualized rate of occurrence
OVAL
privilege
due care
47. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
vulnerability
BS7799
single loss expectancy
risk analysis
48. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
security officer
risk analysis
physical
mappers
49. Made up of ten domains - a mechanism to describe security processes
ISO 17799
chief information security officer
FMEA
administrative
50. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
due care
risk analysis
protocol analyzer
availability