SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. CISO
chief information security officer
risk analysis
network mapping
Control Objectives for Information and related Technology
2. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
CobiT
risk
risk catagories
vulnerability
3. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
annualized loss expectancy
vulnerability scanner
CobiT
Information Technology Infrastructure Library (ITIL)
4. Type of audit that checks that accounts - groups and roles are correctly assigned
vulnerability
countermeasure
privilege
performance baseline
5. An open language from mitre.org for determining vulnerabilities and problems on computer systems
countermeasure
CobiT
OVAL
risk anlysis
6. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
ISO 17799
due care
Failure Modes and Effect Analysis
security governanace
7. Midterm goals
IRM
qualitative
tactical
planning horizon
8. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
risk mitigation
vulnerability
security program
FMEA
9. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
L0phtCrack
confidentiality
Operationally Critical Threat - Asset - and Vulnerability Evaluation
ISO/IEC 27001
10. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
ISO 17799
due care
ITIL
administrative
11. CSO
corporate security officer
Control Objectives for Information and related Technology
risk mitigation
ISO 17799
12. SLE x ARO - (ALE)
SP 800-30
vulnerability
chief information security officer
annualized loss expectancy
13. NIST risk management methodology
CobiT
SP 800-30
risk analysis
strategic
14. Potential danger to information or systems
delayed
No events - Errors only - Errors and warnings - All events
port scanner
threat
15. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
Committee of Sponsoring Organizations
strategic
ISO 17799
due care
16. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
FMEA
performance baseline
L0phtCrack
firewall
17. Assurance of accurancy and reliability of information and systems
ISO 17799
tactical
IRM
integrity
18. Type of audit that checks procedures and policies for escalating issues to management
escalation
exposure factor
threat
security officer
19. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
usage
CISO
risk analysis
threat
20. The following tools (Nessus - Qualys - Retina) are ______________ scanners
blueprints
vulnerability
SP 800-30
Committee of Sponsoring Organizations
21. Made up of ten domains - a mechanism to describe security processes
FMEA
exposure factor
ISO 17799
Failure Modes and Effect Analysis
22. Number of time the incident might occur annually - (ARO)
confidentiality
annualized rate of occurrence
CISO
administrative
23. A log that can record outgoing requests - incoming traffic - and internet usage
firewall
ISO/IEC 27002
Facilitated Risk Analysis Process
countermeasure
24. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
Failure Modes and Effect Analysis
COSO
FMEA
fault tree analysis
25. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
CobiT
risk analysis
CobiT
COSO
26. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
FMEA
vulnerability scanner
Information risk management
security program
27. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
risk mitigation
ISO 17799
elcomsoft
integrity
28. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
confidentiality
ISO/IEC 27002
single loss expectancy
mappers
29. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
ISO 17799
AS/NZS 4360
vulnerability
FMEA
30. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
CISO
exposure factor
OVAL
risk anlysis
31. The tools - personnel and business processes necessary to ensure that security meets needs
security governanace
risk analysis
elcomsoft
BS7799
32. Mitigates a potential risk
usage
countermeasure
CISO
ITIL
33. De facto standard of best practices for IT service mgmt
Information Technology Infrastructure Library (ITIL)
Information risk management
BS7799
risk
34. The asset's value multiplied by the EF percentage - (SLE)
single loss expectancy
ISO/IEC 27005
qualitative
delayed
35. CobiT
data owner
risk
elcomsoft
Control Objectives for Information and related Technology
36. Guide assist in the implemenation of information security based on risk managent approach
risk analysis
blueprints
ISO/IEC 27005
Information Technology Infrastructure Library (ITIL)
37. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
administrative
COSO
threat
OCTAVE
38. Daily goals focused on productivity and task-oriented activities
exposure
operational
firewall
vulnerability
39. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
qualitative
security officer
OCTAVE
risk
40. FMEA
elcomsoft
tactical
Failure Modes and Effect Analysis
ISO/IEC 27004
41. Possiblity of damage and the ramifications should it occur
usage
risk
ITIL
ISO/IEC 27002
42. ISM Standard
CobiT
Information Security Management
network mapping
risk mitigation
43. Event levels available for logging in a MS DNS server
Facilitated Risk Analysis Process
security program
No events - Errors only - Errors and warnings - All events
elcomsoft
44. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
escalation
IRM
CISO
network mapping
45. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
corporate security officer
delayed
CobiT
availability
46. Ensures managment security directives are fulfilled
No events - Errors only - Errors and warnings - All events
vulnerability
security officer
single loss expectancy
47. An instance of being exposed to losses from a threat
security program
ISO/IEC 27001
administrative
exposure
48. Type of audit that checks that network resources - systems and software are used appropriately
vulnerability
usage
ISO/IEC 27001
Facilitated Risk Analysis Process
49. Information security managment measurements
availability
ISO/IEC 27004
COSO
network mapping
50. Ensures necessary level of secrecy and prevents unauthorized disclosure
No events - Errors only - Errors and warnings - All events
COSO
confidentiality
integrity