SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ISM Standard
vulnerability scanner
Information Security Management
CobiT
FRAP
2. Ensures managment security directives are fulfilled
OCTAVE
risk
security officer
risk analysis
3. Strategic - tactical and operational planning
AS/NZS 4360
planning horizon
administrative
risk analysis
4. Number of time the incident might occur annually - (ARO)
OVAL
integrity
CobiT
annualized rate of occurrence
5. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
planning horizon
blueprints
ISO 17799
Information Security Management
6. Type of audit that checks information classification and change control procedures
physical
exposure factor
corporate security officer
administrative
7. Risk mgmt method with much broader focus than IT security
AS/NZS 4360
network mapping
tactical
performance baseline
8. The asset's value multiplied by the EF percentage - (SLE)
technical
COSO
vulnerability
single loss expectancy
9. Assurance of accurancy and reliability of information and systems
Committee of Sponsoring Organizations
due care
security program
integrity
10. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
escalation
vulnerability scanner
vulnerability
physical
11. Percentage of an asset's value that would be lost in a single incident - (EF)
COSO
technical
network mapping
exposure factor
12. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
data owner
risk
corporate security officer
FMEA
13. Mitigates a potential risk
COSO
No events - Errors only - Errors and warnings - All events
countermeasure
CobiT
14. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
threat
performance monitor
data owner
COSO
15. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
IRM
FMEA
CobiT
ITIL
16. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
FMEA
availability
port scanner
physical
17. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
Information Security Management
L0phtCrack
operational
COSO
18. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
risk
qualitative
chief information security officer
corporate security officer
19. NIST risk management methodology
physical
risk catagories
administrative
SP 800-30
20. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
ISO 17799
port scanner
chief information security officer
risk anlysis
21. Focus on service level agreements between IT dept and internal customers
ITIL
physical
FMEA
L0phtCrack
22. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
risk analysis
Facilitated Risk Analysis Process
mappers
administrative
23. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
single loss expectancy
risk catagories
planning horizon
exposure factor
24. Possiblity of damage and the ramifications should it occur
FRAP
vulnerability scanner
risk
vulnerability
25. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
elcomsoft
ISO/IEC 27005
COSO
exposure
26. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
john the ripper
Control Objectives for Information and related Technology
risk catagories
chief information security officer
27. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
vulnerability
port scanner
network mapping
FRAP
28. Event levels available for logging in a MS DNS server
performance baseline
ISO/IEC 27799
No events - Errors only - Errors and warnings - All events
FRAP
29. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
FRAP
risk analysis
security governanace
Failure Modes and Effect Analysis
30. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
Information risk management
mappers
availability
performance baseline
31. Potential danger to information or systems
strategic
CobiT
protocol analyzer
threat
32. CISO
risk anlysis
john the ripper
chief information security officer
protocol analyzer
33. Type of audit that checks that accounts - groups and roles are correctly assigned
risk
Operationally Critical Threat - Asset - and Vulnerability Evaluation
annualized rate of occurrence
privilege
34. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
ISO/IEC 27002
Control Objectives for Information and related Technology
confidentiality
vulnerability
35. OCTAVE
Operationally Critical Threat - Asset - and Vulnerability Evaluation
delayed
risk analysis
vulnerability
36. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
ISO/IEC 27004
CobiT
vulnerability
COSO
37. Collection of controls an organization must have in place
security program
CISO
CobiT
blueprints
38. Information security managment measurements
risk analysis
COSO
integrity
ISO/IEC 27004
39. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
Failure Modes and Effect Analysis
john the ripper
ISO/IEC 27004
IRM
40. Guide to illustrate how to protect personal health information
Information Technology Infrastructure Library (ITIL)
annualized rate of occurrence
ISO/IEC 27799
operational
41. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
usage
elcomsoft
vulnerability
ISO 17799
42. Expected or predetermined performance level - developed from policy - performance - requirements
FRAP
Information Security Management
physical
performance baseline
43. A weakness (software - hardware - procedural - human) that can be exploited
CobiT
vulnerability
risk anlysis
COSO
44. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
BS7799
COSO
Information risk management
ISO 17799
45. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
CISO
corporate security officer
OVAL
COSO
46. CSO
ISO/IEC 27799
CISO
COSO
corporate security officer
47. IT governance at the operational level
CobiT
security program
threat
tactical
48. Derived from the COSO framework
CobiT
Committee of Sponsoring Organizations
BS7799
COSO
49. A log that can record outgoing requests - incoming traffic - and internet usage
L0phtCrack
annualized rate of occurrence
vulnerability scanner
firewall
50. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
protocol analyzer
administrative
planning horizon
ISO 17799