SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Made up of ten domains - a mechanism to describe security processes
countermeasure
Information Security Management
security program
ISO 17799
2. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
vulnerability
BS7799
qualitative
SP 800-30
3. IT governance at the operational level
single loss expectancy
CobiT
ISO/IEC 27799
AS/NZS 4360
4. COSO
L0phtCrack
Committee of Sponsoring Organizations
privilege
risk analysis
5. Ensures necessary level of secrecy and prevents unauthorized disclosure
risk analysis
confidentiality
OVAL
corporate security officer
6. An open language from mitre.org for determining vulnerabilities and problems on computer systems
COSO
OVAL
corporate security officer
countermeasure
7. Provides a cost/benefit comparision
vulnerability
SP 800-30
strategic
risk analysis
8. CobiT
ISO/IEC 27004
AS/NZS 4360
Control Objectives for Information and related Technology
confidentiality
9. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
corporate security officer
CobiT
john the ripper
security officer
10. Collection of controls an organization must have in place
security program
annualized rate of occurrence
risk analysis
Information Technology Infrastructure Library (ITIL)
11. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
COSO
risk mitigation
security officer
CobiT
12. The asset's value multiplied by the EF percentage - (SLE)
physical
Control Objectives for Information and related Technology
annualized loss expectancy
single loss expectancy
13. Type of audit that checks that network resources - systems and software are used appropriately
COSO
firewall
ITIL
usage
14. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
security officer
CobiT
ISO/IEC 27002
tactical
15. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
strategic
security program
COSO
FMEA
16. Used to ID failures in a complex systems to understand underlying causes of threats
fault tree analysis
confidentiality
Operationally Critical Threat - Asset - and Vulnerability Evaluation
integrity
17. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
vulnerability scanner
performance monitor
administrative
security program
18. Information security managment measurements
ISO/IEC 27004
firewall
annualized loss expectancy
SP 800-30
19. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
elcomsoft
ISO/IEC 27001
blueprints
ISO 17799
20. A weakness (software - hardware - procedural - human) that can be exploited
security officer
L0phtCrack
penetration
vulnerability
21. Responsible for communicating to senior mgmt organizational risks and compliance regulations
ITIL
mappers
CISO
integrity
22. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
risk
mappers
elcomsoft
OVAL
23. Type of audit that checks that accounts - groups and roles are correctly assigned
ISO/IEC 27002
mappers
privilege
risk
24. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
administrative
penetration
performance monitor
L0phtCrack
25. Risk mgmt method with much broader focus than IT security
escalation
strategic
AS/NZS 4360
network mapping
26. Midterm goals
availability
OVAL
COSO
tactical
27. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
john the ripper
single loss expectancy
vulnerability
administrative
28. OCTAVE
Operationally Critical Threat - Asset - and Vulnerability Evaluation
Information Security Management
AS/NZS 4360
physical
29. __________ loss has a negative effect after a vulnerability is initially exploited
corporate security officer
delayed
security officer
risk analysis
30. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
strategic
ISO 17799
threat
COSO
31. Possiblity of damage and the ramifications should it occur
risk
vulnerability
L0phtCrack
vulnerability
32. SLE x ARO - (ALE)
CobiT
CobiT
annualized loss expectancy
fault tree analysis
33. Event levels available for logging in a MS DNS server
Information Security Management
No events - Errors only - Errors and warnings - All events
ISO/IEC 27005
FMEA
34. Type of audit that checks information classification and change control procedures
data owner
SP 800-30
administrative
escalation
35. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
strategic
technical
protocol analyzer
CISO
36. Derived from the COSO framework
CobiT
fault tree analysis
risk
Control Objectives for Information and related Technology
37. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
technical
COSO
Failure Modes and Effect Analysis
physical
38. The tools - personnel and business processes necessary to ensure that security meets needs
security governanace
CISO
risk
Committee of Sponsoring Organizations
39. Corporate governance at the strategic level
CobiT
COSO
qualitative
CISO
40. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
ISO/IEC 27004
integrity
FRAP
AS/NZS 4360
41. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
ISO 17799
COSO
administrative
vulnerability
42. Responsible for information classification and protection
data owner
usage
Control Objectives for Information and related Technology
IRM
43. Guide assist in the implemenation of information security based on risk managent approach
CISO
L0phtCrack
planning horizon
ISO/IEC 27005
44. An instance of being exposed to losses from a threat
penetration
risk
exposure
performance baseline
45. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
planning horizon
IRM
FRAP
network mapping
46. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
CISO
corporate security officer
FRAP
CobiT
47. Number of time the incident might occur annually - (ARO)
performance baseline
annualized rate of occurrence
technical
operational
48. FMEA
tactical
CobiT
confidentiality
Failure Modes and Effect Analysis
49. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
OVAL
security officer
FMEA
performance monitor
50. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
security governanace
vulnerability scanner
delayed
CISO
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests