SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
security governanace
CobiT
IRM
L0phtCrack
2. An instance of being exposed to losses from a threat
exposure
performance monitor
due care
administrative
3. Responsible for communicating to senior mgmt organizational risks and compliance regulations
CISO
ISO/IEC 27001
Facilitated Risk Analysis Process
single loss expectancy
4. COSO
chief information security officer
threat
Committee of Sponsoring Organizations
risk
5. ISM Standard
risk analysis
Information Security Management
L0phtCrack
CobiT
6. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
vulnerability
ISO/IEC 27799
security program
risk catagories
7. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
FMEA
BS7799
Information Technology Infrastructure Library (ITIL)
single loss expectancy
8. Risk mgmt method with much broader focus than IT security
risk
operational
data owner
AS/NZS 4360
9. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
Operationally Critical Threat - Asset - and Vulnerability Evaluation
risk
COSO
CobiT
10. De facto standard of best practices for IT service mgmt
elcomsoft
Information Technology Infrastructure Library (ITIL)
john the ripper
availability
11. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
ISO 17799
penetration
Operationally Critical Threat - Asset - and Vulnerability Evaluation
elcomsoft
12. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
ISO/IEC 27001
availability
exposure
Information Security Management
13. Potential danger to information or systems
ISO/IEC 27004
strategic
threat
Information risk management
14. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
risk analysis
performance baseline
CobiT
ISO 17799
15. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
strategic
qualitative
Information Security Management
blueprints
16. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
firewall
Operationally Critical Threat - Asset - and Vulnerability Evaluation
OCTAVE
Information risk management
17. Ensures reliable timely access to data/resources to authorized individuals
CobiT
network mapping
availability
ISO/IEC 27005
18. Tools to ID - develop - and design security requirements for business needs
availability
elcomsoft
blueprints
Information Technology Infrastructure Library (ITIL)
19. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
performance monitor
security program
risk analysis
countermeasure
20. Assurance of accurancy and reliability of information and systems
BS7799
integrity
john the ripper
Failure Modes and Effect Analysis
21. Guide to illustrate how to protect personal health information
risk mitigation
risk analysis
OCTAVE
ISO/IEC 27799
22. Percentage of an asset's value that would be lost in a single incident - (EF)
Information Technology Infrastructure Library (ITIL)
fault tree analysis
AS/NZS 4360
exposure factor
23. CISO
chief information security officer
mappers
network mapping
physical
24. Ensures managment security directives are fulfilled
ISO 17799
delayed
security officer
OVAL
25. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
Information risk management
risk
due care
integrity
26. IRM
Information risk management
tactical
vulnerability scanner
corporate security officer
27. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
administrative
threat
annualized rate of occurrence
risk anlysis
28. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
CISO
vulnerability
annualized loss expectancy
COSO
29. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
COSO
elcomsoft
penetration
performance monitor
30. Mitigates a potential risk
Operationally Critical Threat - Asset - and Vulnerability Evaluation
FRAP
countermeasure
elcomsoft
31. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
john the ripper
FRAP
Information Security Management
planning horizon
32. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
risk anlysis
qualitative
L0phtCrack
network mapping
33. Collection of controls an organization must have in place
security program
CobiT
ISO/IEC 27005
confidentiality
34. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
port scanner
ISO 17799
firewall
security officer
35. A log that can record outgoing requests - incoming traffic - and internet usage
firewall
exposure factor
network mapping
penetration
36. The tools - personnel and business processes necessary to ensure that security meets needs
security governanace
FMEA
Committee of Sponsoring Organizations
usage
37. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
security program
port scanner
fault tree analysis
COSO
38. Possiblity of damage and the ramifications should it occur
chief information security officer
risk
Control Objectives for Information and related Technology
performance baseline
39. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
availability
FMEA
CISO
privilege
40. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
privilege
ISO 17799
countermeasure
COSO
41. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
firewall
single loss expectancy
administrative
annualized rate of occurrence
42. Controls that implement access control - password mangement - identification and authentication methods - configuration
data owner
integrity
COSO
technical
43. Used to ID failures in a complex systems to understand underlying causes of threats
fault tree analysis
Control Objectives for Information and related Technology
risk catagories
ISO/IEC 27005
44. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
ISO/IEC 27002
network mapping
elcomsoft
SP 800-30
45. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
risk
corporate security officer
penetration
protocol analyzer
46. IT governance at the operational level
administrative
FMEA
CobiT
fault tree analysis
47. Type of audit that checks that network resources - systems and software are used appropriately
No events - Errors only - Errors and warnings - All events
physical
ISO/IEC 27002
usage
48. Made up of ten domains - a mechanism to describe security processes
operational
blueprints
ISO 17799
mappers
49. Derived from the COSO framework
vulnerability
administrative
Operationally Critical Threat - Asset - and Vulnerability Evaluation
CobiT
50. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
elcomsoft
FMEA
Facilitated Risk Analysis Process
vulnerability