SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
CISO
availability
ISO/IEC 27002
FRAP
2. Strategic - tactical and operational planning
planning horizon
FMEA
L0phtCrack
security program
3. Guide assist in the implemenation of information security based on risk managent approach
risk anlysis
ISO/IEC 27799
ISO/IEC 27005
COSO
4. FMEA
OVAL
qualitative
Failure Modes and Effect Analysis
Information risk management
5. Responsible for information classification and protection
data owner
AS/NZS 4360
FRAP
usage
6. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
exposure factor
protocol analyzer
risk catagories
Operationally Critical Threat - Asset - and Vulnerability Evaluation
7. CSO
corporate security officer
network mapping
risk
risk catagories
8. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
due care
corporate security officer
Information Security Management
BS7799
9. Ensures reliable timely access to data/resources to authorized individuals
availability
Control Objectives for Information and related Technology
john the ripper
threat
10. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
risk mitigation
vulnerability scanner
qualitative
CobiT
11. Expected or predetermined performance level - developed from policy - performance - requirements
performance monitor
performance baseline
COSO
Information risk management
12. Type of audit that checks information classification and change control procedures
No events - Errors only - Errors and warnings - All events
ISO 17799
administrative
penetration
13. Made up of ten domains - a mechanism to describe security processes
ITIL
ISO/IEC 27001
administrative
ISO 17799
14. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
risk analysis
risk catagories
CobiT
security officer
15. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
network mapping
CobiT
Information Technology Infrastructure Library (ITIL)
ISO/IEC 27799
16. Assurance of accurancy and reliability of information and systems
integrity
escalation
risk analysis
annualized loss expectancy
17. Mitigates a potential risk
chief information security officer
risk mitigation
Committee of Sponsoring Organizations
countermeasure
18. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
qualitative
L0phtCrack
performance monitor
annualized rate of occurrence
19. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
vulnerability scanner
risk catagories
risk analysis
annualized loss expectancy
20. NIST risk management methodology
BS7799
port scanner
operational
SP 800-30
21. Collection of controls an organization must have in place
delayed
security program
No events - Errors only - Errors and warnings - All events
vulnerability
22. Provides a cost/benefit comparision
risk analysis
security program
technical
CobiT
23. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
CobiT
OCTAVE
strategic
FRAP
24. CISO
chief information security officer
security program
Failure Modes and Effect Analysis
Operationally Critical Threat - Asset - and Vulnerability Evaluation
25. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
ISO/IEC 27002
risk anlysis
COSO
fault tree analysis
26. Daily goals focused on productivity and task-oriented activities
L0phtCrack
operational
risk
privilege
27. Risk mgmt method with much broader focus than IT security
AS/NZS 4360
exposure
FMEA
risk mitigation
28. Focus on service level agreements between IT dept and internal customers
countermeasure
confidentiality
risk analysis
ITIL
29. De facto standard of best practices for IT service mgmt
No events - Errors only - Errors and warnings - All events
Control Objectives for Information and related Technology
Information Technology Infrastructure Library (ITIL)
chief information security officer
30. Responsible for communicating to senior mgmt organizational risks and compliance regulations
Information risk management
CobiT
CISO
data owner
31. IT governance at the operational level
security program
vulnerability
performance baseline
CobiT
32. A weakness (software - hardware - procedural - human) that can be exploited
ISO/IEC 27004
SP 800-30
threat
vulnerability
33. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
FMEA
exposure
Information Technology Infrastructure Library (ITIL)
protocol analyzer
34. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
L0phtCrack
tactical
escalation
ISO 17799
35. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
risk analysis
Information Technology Infrastructure Library (ITIL)
operational
COSO
36. The asset's value multiplied by the EF percentage - (SLE)
single loss expectancy
john the ripper
ISO 17799
protocol analyzer
37. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
CobiT
network mapping
confidentiality
CISO
38. OCTAVE
Failure Modes and Effect Analysis
IRM
Operationally Critical Threat - Asset - and Vulnerability Evaluation
Information Technology Infrastructure Library (ITIL)
39. Percentage of an asset's value that would be lost in a single incident - (EF)
ISO 17799
exposure factor
Information Technology Infrastructure Library (ITIL)
Information risk management
40. Possiblity of damage and the ramifications should it occur
exposure factor
threat
risk
ISO 17799
41. FRAP
Facilitated Risk Analysis Process
port scanner
CobiT
ISO/IEC 27001
42. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
CobiT
ISO/IEC 27002
risk
protocol analyzer
43. Information security managment measurements
fault tree analysis
risk analysis
FMEA
ISO/IEC 27004
44. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
CobiT
elcomsoft
Information risk management
risk mitigation
45. Type of audit that checks that network resources - systems and software are used appropriately
usage
ISO/IEC 27002
COSO
annualized loss expectancy
46. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
countermeasure
security program
COSO
SP 800-30
47. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
COSO
port scanner
ITIL
COSO
48. Type of audit that checks procedures and policies for escalating issues to management
L0phtCrack
port scanner
escalation
single loss expectancy
49. Guide to illustrate how to protect personal health information
countermeasure
port scanner
ISO/IEC 27799
single loss expectancy
50. Controls that implement access control - password mangement - identification and authentication methods - configuration
ISO/IEC 27799
L0phtCrack
technical
Information risk management