SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Used to ID failures in a complex systems to understand underlying causes of threats
fault tree analysis
administrative
AS/NZS 4360
vulnerability
2. Guide assist in the implemenation of information security based on risk managent approach
vulnerability
risk mitigation
OVAL
ISO/IEC 27005
3. Risk mgmt method with much broader focus than IT security
SP 800-30
AS/NZS 4360
network mapping
protocol analyzer
4. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
Committee of Sponsoring Organizations
vulnerability scanner
annualized loss expectancy
performance baseline
5. An open language from mitre.org for determining vulnerabilities and problems on computer systems
OVAL
Control Objectives for Information and related Technology
integrity
vulnerability scanner
6. Information security managment measurements
risk analysis
single loss expectancy
risk analysis
ISO/IEC 27004
7. A weakness (software - hardware - procedural - human) that can be exploited
usage
vulnerability
Committee of Sponsoring Organizations
FMEA
8. Type of audit that checks that network resources - systems and software are used appropriately
vulnerability
security program
COSO
usage
9. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
confidentiality
delayed
single loss expectancy
ISO/IEC 27002
10. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
OCTAVE
exposure
mappers
availability
11. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
security program
ISO/IEC 27002
ISO/IEC 27001
threat
12. SLE x ARO - (ALE)
physical
annualized loss expectancy
exposure
network mapping
13. Tools to ID - develop - and design security requirements for business needs
risk mitigation
IRM
ISO 17799
blueprints
14. CobiT
exposure factor
Control Objectives for Information and related Technology
CobiT
ITIL
15. Made up of ten domains - a mechanism to describe security processes
ISO 17799
L0phtCrack
risk catagories
vulnerability
16. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
COSO
risk catagories
risk analysis
administrative
17. Provides a cost/benefit comparision
risk
Operationally Critical Threat - Asset - and Vulnerability Evaluation
risk analysis
FMEA
18. Percentage of an asset's value that would be lost in a single incident - (EF)
annualized rate of occurrence
administrative
exposure factor
vulnerability
19. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
BS7799
risk mitigation
confidentiality
No events - Errors only - Errors and warnings - All events
20. Possiblity of damage and the ramifications should it occur
ISO 17799
risk
Information Security Management
delayed
21. Strategic - tactical and operational planning
Information Security Management
blueprints
escalation
planning horizon
22. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
CobiT
penetration
Information Technology Infrastructure Library (ITIL)
ISO/IEC 27004
23. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
BS7799
CobiT
SP 800-30
network mapping
24. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
CISO
performance monitor
single loss expectancy
mappers
25. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
ISO/IEC 27002
L0phtCrack
security program
Operationally Critical Threat - Asset - and Vulnerability Evaluation
26. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
risk anlysis
risk analysis
network mapping
physical
27. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
ITIL
Operationally Critical Threat - Asset - and Vulnerability Evaluation
data owner
FMEA
28. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
escalation
risk catagories
vulnerability scanner
security officer
29. An instance of being exposed to losses from a threat
FMEA
planning horizon
exposure
Information risk management
30. IT governance at the operational level
CobiT
blueprints
operational
ISO/IEC 27799
31. Focus on service level agreements between IT dept and internal customers
ISO 17799
COSO
CobiT
ITIL
32. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
risk analysis
Information Security Management
ITIL
firewall
33. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
ITIL
elcomsoft
FRAP
Committee of Sponsoring Organizations
34. Responsible for communicating to senior mgmt organizational risks and compliance regulations
CISO
confidentiality
administrative
firewall
35. Ensures managment security directives are fulfilled
risk
security officer
annualized rate of occurrence
FRAP
36. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
COSO
FRAP
risk catagories
ISO/IEC 27001
37. Assurance of accurancy and reliability of information and systems
vulnerability scanner
CobiT
COSO
integrity
38. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
port scanner
ITIL
security program
CISO
39. CISO
CobiT
vulnerability
chief information security officer
operational
40. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
availability
security program
FRAP
Control Objectives for Information and related Technology
41. Ensures necessary level of secrecy and prevents unauthorized disclosure
confidentiality
Failure Modes and Effect Analysis
ISO/IEC 27004
delayed
42. FMEA
SP 800-30
chief information security officer
protocol analyzer
Failure Modes and Effect Analysis
43. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
delayed
network mapping
john the ripper
Information risk management
44. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
due care
chief information security officer
ISO/IEC 27001
network mapping
45. COSO
SP 800-30
technical
AS/NZS 4360
Committee of Sponsoring Organizations
46. Corporate governance at the strategic level
COSO
security program
tactical
corporate security officer
47. Expected or predetermined performance level - developed from policy - performance - requirements
performance baseline
CobiT
No events - Errors only - Errors and warnings - All events
countermeasure
48. Collection of controls an organization must have in place
single loss expectancy
security program
CobiT
fault tree analysis
49. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
security program
ISO/IEC 27005
CobiT
network mapping
50. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
ISO 17799
ISO/IEC 27799
FMEA
OVAL