SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. __________ loss has a negative effect after a vulnerability is initially exploited
risk catagories
Facilitated Risk Analysis Process
physical
delayed
2. The likelihood of exploitation and the loss potential
risk
risk analysis
risk analysis
ISO/IEC 27799
3. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
Committee of Sponsoring Organizations
IRM
risk mitigation
chief information security officer
4. IT governance at the operational level
threat
administrative
CobiT
penetration
5. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
risk mitigation
planning horizon
BS7799
risk catagories
6. Type of audit that checks procedures and policies for escalating issues to management
Facilitated Risk Analysis Process
corporate security officer
security governanace
escalation
7. De facto standard of best practices for IT service mgmt
risk analysis
Information Technology Infrastructure Library (ITIL)
security officer
due care
8. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
vulnerability
performance baseline
FMEA
penetration
9. FMEA
OCTAVE
chief information security officer
ISO 17799
Failure Modes and Effect Analysis
10. An instance of being exposed to losses from a threat
exposure
operational
CobiT
physical
11. OCTAVE
Operationally Critical Threat - Asset - and Vulnerability Evaluation
tactical
risk anlysis
Information risk management
12. Ensures managment security directives are fulfilled
risk mitigation
exposure factor
security officer
risk anlysis
13. The tools - personnel and business processes necessary to ensure that security meets needs
corporate security officer
security governanace
single loss expectancy
threat
14. Ensures necessary level of secrecy and prevents unauthorized disclosure
confidentiality
elcomsoft
CobiT
Facilitated Risk Analysis Process
15. Type of audit that checks that accounts - groups and roles are correctly assigned
escalation
strategic
privilege
ISO/IEC 27005
16. NIST risk management methodology
COSO
ITIL
SP 800-30
CobiT
17. Provides a cost/benefit comparision
vulnerability
ISO 17799
No events - Errors only - Errors and warnings - All events
risk analysis
18. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
ISO/IEC 27004
security program
No events - Errors only - Errors and warnings - All events
risk analysis
19. Percentage of an asset's value that would be lost in a single incident - (EF)
Information Technology Infrastructure Library (ITIL)
administrative
exposure factor
protocol analyzer
20. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
ISO 17799
administrative
ISO/IEC 27799
port scanner
21. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
L0phtCrack
security officer
firewall
port scanner
22. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
network mapping
CISO
ISO/IEC 27799
protocol analyzer
23. Type of audit that checks information classification and change control procedures
administrative
risk mitigation
protocol analyzer
CobiT
24. Corporate governance at the strategic level
fault tree analysis
OVAL
annualized rate of occurrence
COSO
25. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
network mapping
elcomsoft
vulnerability
escalation
26. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
security governanace
vulnerability
performance monitor
exposure factor
27. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
protocol analyzer
CISO
exposure factor
risk
28. Event levels available for logging in a MS DNS server
No events - Errors only - Errors and warnings - All events
planning horizon
Information Technology Infrastructure Library (ITIL)
OVAL
29. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
risk anlysis
protocol analyzer
risk
integrity
30. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
FMEA
ISO 17799
risk
CobiT
31. SLE x ARO - (ALE)
annualized loss expectancy
Control Objectives for Information and related Technology
OCTAVE
technical
32. Used to ID failures in a complex systems to understand underlying causes of threats
fault tree analysis
vulnerability
risk catagories
ISO/IEC 27799
33. Midterm goals
strategic
exposure
tactical
threat
34. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
OCTAVE
availability
FRAP
escalation
35. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
COSO
CobiT
data owner
planning horizon
36. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
ISO/IEC 27002
security program
port scanner
chief information security officer
37. A weakness (software - hardware - procedural - human) that can be exploited
vulnerability
planning horizon
escalation
ISO/IEC 27001
38. Assurance of accurancy and reliability of information and systems
port scanner
integrity
exposure factor
technical
39. Made up of ten domains - a mechanism to describe security processes
Operationally Critical Threat - Asset - and Vulnerability Evaluation
COSO
ISO 17799
availability
40. Mitigates a potential risk
mappers
tactical
countermeasure
elcomsoft
41. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
corporate security officer
elcomsoft
penetration
vulnerability scanner
42. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
performance baseline
ITIL
qualitative
john the ripper
43. The following tools (Nessus - Qualys - Retina) are ______________ scanners
vulnerability
integrity
AS/NZS 4360
OCTAVE
44. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
COSO
Facilitated Risk Analysis Process
blueprints
risk catagories
45. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
elcomsoft
administrative
performance baseline
CobiT
46. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
CobiT
risk
security program
protocol analyzer
47. IRM
Failure Modes and Effect Analysis
Information risk management
integrity
ISO 17799
48. CSO
escalation
CobiT
corporate security officer
planning horizon
49. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
chief information security officer
vulnerability
FRAP
CISO
50. Guide to illustrate how to protect personal health information
vulnerability
ISO/IEC 27799
elcomsoft
network mapping