SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
annualized loss expectancy
protocol analyzer
L0phtCrack
escalation
2. Responsible for communicating to senior mgmt organizational risks and compliance regulations
Committee of Sponsoring Organizations
due care
qualitative
CISO
3. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
privilege
countermeasure
Failure Modes and Effect Analysis
port scanner
4. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
risk
security program
due care
Information Security Management
5. Ensures reliable timely access to data/resources to authorized individuals
planning horizon
availability
threat
confidentiality
6. A log that can record outgoing requests - incoming traffic - and internet usage
physical
due care
firewall
COSO
7. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
single loss expectancy
elcomsoft
due care
vulnerability
8. Focus on service level agreements between IT dept and internal customers
data owner
due care
ITIL
privilege
9. Guide to illustrate how to protect personal health information
CobiT
administrative
ISO/IEC 27799
Information Security Management
10. Provides a cost/benefit comparision
tactical
vulnerability
risk analysis
vulnerability
11. An open language from mitre.org for determining vulnerabilities and problems on computer systems
CISO
risk anlysis
integrity
OVAL
12. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
data owner
strategic
COSO
AS/NZS 4360
13. Information security managment measurements
ISO/IEC 27004
delayed
data owner
network mapping
14. Responsible for information classification and protection
security program
fault tree analysis
data owner
ITIL
15. Potential danger to information or systems
OVAL
tactical
data owner
threat
16. Number of time the incident might occur annually - (ARO)
CobiT
annualized rate of occurrence
SP 800-30
delayed
17. Mitigates a potential risk
CISO
fault tree analysis
network mapping
countermeasure
18. Corporate governance at the strategic level
network mapping
Information Technology Infrastructure Library (ITIL)
COSO
risk
19. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
penetration
FMEA
performance baseline
ITIL
20. OCTAVE
vulnerability scanner
annualized loss expectancy
Operationally Critical Threat - Asset - and Vulnerability Evaluation
elcomsoft
21. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
countermeasure
No events - Errors only - Errors and warnings - All events
vulnerability
CISO
22. __________ loss has a negative effect after a vulnerability is initially exploited
delayed
blueprints
network mapping
ISO 17799
23. FRAP
FMEA
ISO/IEC 27005
countermeasure
Facilitated Risk Analysis Process
24. Collection of controls an organization must have in place
Information Technology Infrastructure Library (ITIL)
security program
ISO/IEC 27005
CobiT
25. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
escalation
L0phtCrack
security governanace
risk analysis
26. FMEA
ITIL
Failure Modes and Effect Analysis
Information risk management
ISO/IEC 27001
27. Strategic - tactical and operational planning
planning horizon
Information Technology Infrastructure Library (ITIL)
OCTAVE
john the ripper
28. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
ISO/IEC 27002
CISO
firewall
administrative
29. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
ISO 17799
performance monitor
CobiT
planning horizon
30. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
administrative
risk
planning horizon
OCTAVE
31. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
physical
availability
blueprints
COSO
32. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
ISO/IEC 27005
vulnerability
IRM
OCTAVE
33. Assurance of accurancy and reliability of information and systems
escalation
integrity
security program
risk mitigation
34. Type of audit that checks information classification and change control procedures
ISO 17799
administrative
Failure Modes and Effect Analysis
confidentiality
35. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
protocol analyzer
exposure factor
ISO 17799
security program
36. Possiblity of damage and the ramifications should it occur
BS7799
due care
risk
strategic
37. IRM
corporate security officer
Failure Modes and Effect Analysis
AS/NZS 4360
Information risk management
38. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
Operationally Critical Threat - Asset - and Vulnerability Evaluation
Control Objectives for Information and related Technology
fault tree analysis
COSO
39. The likelihood of exploitation and the loss potential
risk
CISO
ISO 17799
threat
40. Tools to ID - develop - and design security requirements for business needs
COSO
blueprints
No events - Errors only - Errors and warnings - All events
risk analysis
41. Used to ID failures in a complex systems to understand underlying causes of threats
corporate security officer
fault tree analysis
risk catagories
Facilitated Risk Analysis Process
42. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
administrative
security governanace
john the ripper
fault tree analysis
43. Made up of ten domains - a mechanism to describe security processes
ISO 17799
strategic
FMEA
OVAL
44. The tools - personnel and business processes necessary to ensure that security meets needs
security governanace
L0phtCrack
security program
exposure factor
45. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
penetration
OVAL
network mapping
performance baseline
46. CISO
fault tree analysis
privilege
chief information security officer
due care
47. Ensures managment security directives are fulfilled
single loss expectancy
COSO
qualitative
security officer
48. Derived from the COSO framework
risk mitigation
planning horizon
CobiT
No events - Errors only - Errors and warnings - All events
49. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
mappers
data owner
strategic
annualized loss expectancy
50. Ensures necessary level of secrecy and prevents unauthorized disclosure
confidentiality
operational
risk
escalation