SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
CISO
OCTAVE
penetration
protocol analyzer
2. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
due care
strategic
security governanace
security program
3. An instance of being exposed to losses from a threat
security program
delayed
exposure
integrity
4. Provides a cost/benefit comparision
privilege
risk analysis
security governanace
CISO
5. Daily goals focused on productivity and task-oriented activities
vulnerability
operational
john the ripper
annualized rate of occurrence
6. Ensures reliable timely access to data/resources to authorized individuals
chief information security officer
availability
ISO/IEC 27799
risk anlysis
7. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
FRAP
vulnerability
risk catagories
COSO
8. Used to ID failures in a complex systems to understand underlying causes of threats
fault tree analysis
protocol analyzer
technical
SP 800-30
9. SLE x ARO - (ALE)
security program
risk catagories
annualized loss expectancy
Facilitated Risk Analysis Process
10. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
corporate security officer
FRAP
FMEA
CobiT
11. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
due care
SP 800-30
ISO 17799
COSO
12. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
COSO
escalation
threat
network mapping
13. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
risk mitigation
FMEA
mappers
L0phtCrack
14. Expected or predetermined performance level - developed from policy - performance - requirements
annualized rate of occurrence
performance baseline
integrity
privilege
15. OCTAVE
risk analysis
Operationally Critical Threat - Asset - and Vulnerability Evaluation
network mapping
Information risk management
16. Number of time the incident might occur annually - (ARO)
planning horizon
ISO/IEC 27004
annualized rate of occurrence
availability
17. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
delayed
john the ripper
Facilitated Risk Analysis Process
SP 800-30
18. Type of audit that checks procedures and policies for escalating issues to management
COSO
Committee of Sponsoring Organizations
escalation
firewall
19. CobiT
network mapping
FMEA
Control Objectives for Information and related Technology
ISO/IEC 27001
20. Tools to ID - develop - and design security requirements for business needs
blueprints
vulnerability scanner
L0phtCrack
exposure
21. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
L0phtCrack
BS7799
due care
vulnerability
22. The tools - personnel and business processes necessary to ensure that security meets needs
CISO
Information Technology Infrastructure Library (ITIL)
CobiT
security governanace
23. An open language from mitre.org for determining vulnerabilities and problems on computer systems
fault tree analysis
Facilitated Risk Analysis Process
OVAL
Information Security Management
24. Possiblity of damage and the ramifications should it occur
COSO
risk
tactical
CISO
25. Guide assist in the implemenation of information security based on risk managent approach
network mapping
FMEA
Information Technology Infrastructure Library (ITIL)
ISO/IEC 27005
26. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
blueprints
risk
network mapping
risk analysis
27. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
risk anlysis
network mapping
FMEA
risk catagories
28. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
CobiT
due care
BS7799
elcomsoft
29. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
BS7799
john the ripper
availability
port scanner
30. A log that can record outgoing requests - incoming traffic - and internet usage
threat
COSO
planning horizon
firewall
31. Collection of controls an organization must have in place
vulnerability
Facilitated Risk Analysis Process
security program
technical
32. The asset's value multiplied by the EF percentage - (SLE)
performance monitor
protocol analyzer
single loss expectancy
FMEA
33. NIST risk management methodology
vulnerability
security officer
FMEA
SP 800-30
34. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
ISO/IEC 27005
network mapping
elcomsoft
FMEA
35. A weakness (software - hardware - procedural - human) that can be exploited
port scanner
risk catagories
FMEA
vulnerability
36. Type of audit that checks that accounts - groups and roles are correctly assigned
tactical
mappers
privilege
delayed
37. Risk mgmt method with much broader focus than IT security
AS/NZS 4360
threat
annualized loss expectancy
risk catagories
38. Potential danger to information or systems
network mapping
Information risk management
threat
privilege
39. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
risk mitigation
Operationally Critical Threat - Asset - and Vulnerability Evaluation
physical
ISO/IEC 27001
40. Responsible for information classification and protection
data owner
escalation
OCTAVE
ISO/IEC 27005
41. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
CobiT
ISO/IEC 27002
security program
blueprints
42. Midterm goals
tactical
ITIL
planning horizon
vulnerability
43. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
FMEA
risk
performance monitor
qualitative
44. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
No events - Errors only - Errors and warnings - All events
network mapping
administrative
OCTAVE
45. De facto standard of best practices for IT service mgmt
Control Objectives for Information and related Technology
threat
tactical
Information Technology Infrastructure Library (ITIL)
46. __________ loss has a negative effect after a vulnerability is initially exploited
delayed
Information Technology Infrastructure Library (ITIL)
SP 800-30
risk catagories
47. FRAP
Information risk management
vulnerability
exposure
Facilitated Risk Analysis Process
48. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
due care
COSO
tactical
risk anlysis
49. Responsible for communicating to senior mgmt organizational risks and compliance regulations
vulnerability
CISO
ISO/IEC 27002
OCTAVE
50. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
COSO
security governanace
risk
integrity