SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The following tools (Nessus - Qualys - Retina) are ______________ scanners
vulnerability
elcomsoft
privilege
L0phtCrack
2. The likelihood of exploitation and the loss potential
risk
chief information security officer
ISO 17799
vulnerability
3. Used to ID failures in a complex systems to understand underlying causes of threats
security governanace
risk mitigation
fault tree analysis
Failure Modes and Effect Analysis
4. __________ loss has a negative effect after a vulnerability is initially exploited
risk mitigation
delayed
CobiT
countermeasure
5. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
network mapping
usage
ISO 17799
FMEA
6. FMEA
Failure Modes and Effect Analysis
Information risk management
security governanace
mappers
7. Information security managment measurements
security program
ISO/IEC 27004
network mapping
performance monitor
8. The tools - personnel and business processes necessary to ensure that security meets needs
security program
AS/NZS 4360
exposure
security governanace
9. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
OCTAVE
tactical
Information Technology Infrastructure Library (ITIL)
CobiT
10. Ensures managment security directives are fulfilled
blueprints
security officer
security program
security program
11. IT governance at the operational level
chief information security officer
AS/NZS 4360
CobiT
operational
12. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
L0phtCrack
vulnerability scanner
data owner
administrative
13. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
Failure Modes and Effect Analysis
performance monitor
qualitative
escalation
14. Number of time the incident might occur annually - (ARO)
escalation
firewall
COSO
annualized rate of occurrence
15. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
risk analysis
annualized loss expectancy
Operationally Critical Threat - Asset - and Vulnerability Evaluation
CobiT
16. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
risk anlysis
planning horizon
FMEA
firewall
17. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
CobiT
L0phtCrack
risk
fault tree analysis
18. Guide assist in the implemenation of information security based on risk managent approach
ISO/IEC 27005
ISO/IEC 27799
No events - Errors only - Errors and warnings - All events
risk mitigation
19. Ensures necessary level of secrecy and prevents unauthorized disclosure
due care
confidentiality
security governanace
chief information security officer
20. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
SP 800-30
Operationally Critical Threat - Asset - and Vulnerability Evaluation
BS7799
vulnerability scanner
21. The asset's value multiplied by the EF percentage - (SLE)
COSO
delayed
ISO/IEC 27002
single loss expectancy
22. COSO
ISO 17799
ISO/IEC 27005
Committee of Sponsoring Organizations
FRAP
23. CISO
annualized loss expectancy
exposure
chief information security officer
OCTAVE
24. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
threat
ISO/IEC 27005
annualized loss expectancy
qualitative
25. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
planning horizon
L0phtCrack
administrative
COSO
26. Mitigates a potential risk
countermeasure
AS/NZS 4360
IRM
ISO/IEC 27002
27. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
performance baseline
performance monitor
No events - Errors only - Errors and warnings - All events
IRM
28. Risk mgmt method with much broader focus than IT security
ITIL
AS/NZS 4360
OCTAVE
annualized rate of occurrence
29. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
ISO 17799
ISO/IEC 27004
ISO/IEC 27001
port scanner
30. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
mappers
penetration
COSO
CobiT
31. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
network mapping
due care
ISO/IEC 27001
BS7799
32. Controls that implement access control - password mangement - identification and authentication methods - configuration
CISO
corporate security officer
technical
L0phtCrack
33. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
firewall
No events - Errors only - Errors and warnings - All events
FMEA
tactical
34. Responsible for information classification and protection
data owner
CISO
elcomsoft
performance baseline
35. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
vulnerability
threat
delayed
ISO/IEC 27002
36. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
corporate security officer
Control Objectives for Information and related Technology
protocol analyzer
performance monitor
37. Type of audit that checks that accounts - groups and roles are correctly assigned
privilege
blueprints
ISO 17799
mappers
38. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
elcomsoft
No events - Errors only - Errors and warnings - All events
risk mitigation
physical
39. Ensures reliable timely access to data/resources to authorized individuals
annualized loss expectancy
availability
Control Objectives for Information and related Technology
IRM
40. De facto standard of best practices for IT service mgmt
performance baseline
COSO
firewall
Information Technology Infrastructure Library (ITIL)
41. Type of audit that checks procedures and policies for escalating issues to management
CobiT
escalation
annualized rate of occurrence
ISO/IEC 27799
42. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
L0phtCrack
CobiT
fault tree analysis
elcomsoft
43. Type of audit that checks information classification and change control procedures
CobiT
performance monitor
administrative
FMEA
44. Focus on service level agreements between IT dept and internal customers
risk
security governanace
fault tree analysis
ITIL
45. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
risk analysis
exposure
physical
port scanner
46. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
ISO/IEC 27005
due care
delayed
risk catagories
47. OCTAVE
performance monitor
Operationally Critical Threat - Asset - and Vulnerability Evaluation
exposure
risk
48. Tools to ID - develop - and design security requirements for business needs
ISO/IEC 27004
physical
technical
blueprints
49. Corporate governance at the strategic level
ISO 17799
COSO
performance monitor
risk analysis
50. NIST risk management methodology
SP 800-30
risk analysis
CobiT
performance monitor
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests