SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Risk mgmt method with much broader focus than IT security
SP 800-30
AS/NZS 4360
CISO
exposure
2. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
risk mitigation
ISO/IEC 27002
mappers
risk catagories
3. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
fault tree analysis
risk anlysis
ISO/IEC 27004
due care
4. __________ loss has a negative effect after a vulnerability is initially exploited
planning horizon
ISO/IEC 27002
performance baseline
delayed
5. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
FRAP
performance monitor
No events - Errors only - Errors and warnings - All events
risk mitigation
6. Made up of ten domains - a mechanism to describe security processes
performance baseline
chief information security officer
ISO 17799
security governanace
7. IRM
Information risk management
FMEA
Operationally Critical Threat - Asset - and Vulnerability Evaluation
security officer
8. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
vulnerability
physical
risk analysis
Control Objectives for Information and related Technology
9. Responsible for information classification and protection
Information Security Management
physical
escalation
data owner
10. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
threat
annualized rate of occurrence
technical
FMEA
11. The asset's value multiplied by the EF percentage - (SLE)
single loss expectancy
CobiT
COSO
security program
12. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
port scanner
CISO
john the ripper
ISO/IEC 27004
13. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
BS7799
vulnerability
SP 800-30
penetration
14. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
chief information security officer
delayed
elcomsoft
performance monitor
15. Focus on service level agreements between IT dept and internal customers
ITIL
ISO/IEC 27799
Information risk management
single loss expectancy
16. Event levels available for logging in a MS DNS server
No events - Errors only - Errors and warnings - All events
threat
Operationally Critical Threat - Asset - and Vulnerability Evaluation
network mapping
17. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
ITIL
BS7799
FMEA
Information Security Management
18. Corporate governance at the strategic level
risk
vulnerability
COSO
CobiT
19. A weakness (software - hardware - procedural - human) that can be exploited
vulnerability
ISO/IEC 27004
COSO
data owner
20. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
ISO/IEC 27005
CISO
risk anlysis
availability
21. An instance of being exposed to losses from a threat
security governanace
exposure
due care
escalation
22. Guide to illustrate how to protect personal health information
administrative
Control Objectives for Information and related Technology
risk
ISO/IEC 27799
23. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
port scanner
vulnerability
FMEA
elcomsoft
24. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
CISO
annualized rate of occurrence
Facilitated Risk Analysis Process
protocol analyzer
25. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
risk anlysis
FMEA
Information risk management
physical
26. The following tools (Nessus - Qualys - Retina) are ______________ scanners
vulnerability
exposure factor
blueprints
technical
27. Mitigates a potential risk
countermeasure
No events - Errors only - Errors and warnings - All events
CobiT
fault tree analysis
28. Expected or predetermined performance level - developed from policy - performance - requirements
performance baseline
annualized rate of occurrence
Operationally Critical Threat - Asset - and Vulnerability Evaluation
L0phtCrack
29. Assurance of accurancy and reliability of information and systems
confidentiality
mappers
annualized rate of occurrence
integrity
30. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
exposure
network mapping
administrative
availability
31. Ensures managment security directives are fulfilled
security officer
annualized rate of occurrence
Failure Modes and Effect Analysis
CobiT
32. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
risk analysis
risk catagories
FRAP
risk anlysis
33. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
COSO
qualitative
risk analysis
risk
34. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
administrative
qualitative
technical
john the ripper
35. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
Control Objectives for Information and related Technology
elcomsoft
Information risk management
vulnerability
36. Tools to ID - develop - and design security requirements for business needs
network mapping
blueprints
risk mitigation
vulnerability
37. NIST risk management methodology
CobiT
risk analysis
SP 800-30
availability
38. Collection of controls an organization must have in place
FRAP
availability
firewall
security program
39. FMEA
risk analysis
Failure Modes and Effect Analysis
delayed
qualitative
40. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
OCTAVE
ISO 17799
COSO
vulnerability
41. Guide assist in the implemenation of information security based on risk managent approach
CobiT
performance baseline
ISO/IEC 27005
physical
42. Type of audit that checks that network resources - systems and software are used appropriately
blueprints
usage
network mapping
strategic
43. CobiT
BS7799
L0phtCrack
Control Objectives for Information and related Technology
risk mitigation
44. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
Failure Modes and Effect Analysis
ISO/IEC 27001
ITIL
Control Objectives for Information and related Technology
45. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
elcomsoft
ITIL
CobiT
ISO/IEC 27002
46. Provides a cost/benefit comparision
risk anlysis
risk analysis
administrative
BS7799
47. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
No events - Errors only - Errors and warnings - All events
annualized rate of occurrence
strategic
ISO/IEC 27005
48. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
COSO
escalation
Control Objectives for Information and related Technology
chief information security officer
49. SLE x ARO - (ALE)
network mapping
elcomsoft
performance baseline
annualized loss expectancy
50. Strategic - tactical and operational planning
administrative
planning horizon
elcomsoft
Information Security Management