SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
CobiT
Operationally Critical Threat - Asset - and Vulnerability Evaluation
planning horizon
port scanner
2. SLE x ARO - (ALE)
ISO/IEC 27001
exposure factor
annualized loss expectancy
Control Objectives for Information and related Technology
3. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
Information Security Management
risk anlysis
risk analysis
risk
4. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
ITIL
ISO/IEC 27799
ISO/IEC 27001
elcomsoft
5. Collection of controls an organization must have in place
CobiT
countermeasure
security program
SP 800-30
6. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
chief information security officer
technical
No events - Errors only - Errors and warnings - All events
FRAP
7. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
network mapping
threat
COSO
single loss expectancy
8. Event levels available for logging in a MS DNS server
annualized loss expectancy
delayed
network mapping
No events - Errors only - Errors and warnings - All events
9. OCTAVE
escalation
Operationally Critical Threat - Asset - and Vulnerability Evaluation
penetration
availability
10. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
tactical
ISO/IEC 27001
mappers
L0phtCrack
11. Percentage of an asset's value that would be lost in a single incident - (EF)
CobiT
privilege
technical
exposure factor
12. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
escalation
ISO/IEC 27004
protocol analyzer
L0phtCrack
13. The asset's value multiplied by the EF percentage - (SLE)
vulnerability
OCTAVE
fault tree analysis
single loss expectancy
14. Possiblity of damage and the ramifications should it occur
risk
performance baseline
risk mitigation
countermeasure
15. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
CISO
Failure Modes and Effect Analysis
FMEA
elcomsoft
16. IT governance at the operational level
annualized loss expectancy
threat
CobiT
technical
17. Used to ID failures in a complex systems to understand underlying causes of threats
CISO
fault tree analysis
risk catagories
threat
18. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
qualitative
ISO/IEC 27002
technical
ISO/IEC 27004
19. Type of audit that checks that accounts - groups and roles are correctly assigned
privilege
Information Technology Infrastructure Library (ITIL)
ISO 17799
firewall
20. Midterm goals
IRM
CobiT
tactical
confidentiality
21. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
FMEA
CobiT
Information Security Management
L0phtCrack
22. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
security program
CISO
qualitative
risk
23. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
vulnerability
risk mitigation
ISO/IEC 27004
countermeasure
24. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
OCTAVE
Information Technology Infrastructure Library (ITIL)
fault tree analysis
risk
25. Number of time the incident might occur annually - (ARO)
annualized rate of occurrence
OCTAVE
No events - Errors only - Errors and warnings - All events
escalation
26. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
Information Security Management
Committee of Sponsoring Organizations
ISO 17799
tactical
27. Tools to ID - develop - and design security requirements for business needs
blueprints
Information Security Management
administrative
COSO
28. Guide assist in the implemenation of information security based on risk managent approach
COSO
ISO/IEC 27005
risk catagories
security program
29. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
risk analysis
annualized loss expectancy
vulnerability scanner
protocol analyzer
30. An instance of being exposed to losses from a threat
ITIL
usage
Facilitated Risk Analysis Process
exposure
31. FMEA
FMEA
Failure Modes and Effect Analysis
security governanace
privilege
32. Potential danger to information or systems
qualitative
CobiT
security officer
threat
33. CISO
availability
FMEA
chief information security officer
blueprints
34. Provides a cost/benefit comparision
risk analysis
ITIL
privilege
vulnerability
35. A weakness (software - hardware - procedural - human) that can be exploited
corporate security officer
vulnerability
administrative
SP 800-30
36. Type of audit that checks information classification and change control procedures
administrative
annualized loss expectancy
strategic
chief information security officer
37. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
IRM
countermeasure
ISO 17799
ISO/IEC 27005
38. Made up of ten domains - a mechanism to describe security processes
ISO/IEC 27799
SP 800-30
ISO 17799
CobiT
39. CSO
corporate security officer
risk catagories
usage
COSO
40. Derived from the COSO framework
due care
CobiT
ISO/IEC 27004
vulnerability
41. Assurance of accurancy and reliability of information and systems
integrity
physical
qualitative
CobiT
42. COSO
Committee of Sponsoring Organizations
administrative
FMEA
risk
43. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
due care
john the ripper
fault tree analysis
confidentiality
44. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
CobiT
CISO
operational
performance monitor
45. Controls that implement access control - password mangement - identification and authentication methods - configuration
ISO/IEC 27002
due care
technical
protocol analyzer
46. The tools - personnel and business processes necessary to ensure that security meets needs
COSO
security governanace
No events - Errors only - Errors and warnings - All events
risk analysis
47. __________ loss has a negative effect after a vulnerability is initially exploited
BS7799
performance monitor
delayed
operational
48. Mitigates a potential risk
administrative
countermeasure
SP 800-30
Information risk management
49. Ensures necessary level of secrecy and prevents unauthorized disclosure
Information Technology Infrastructure Library (ITIL)
L0phtCrack
confidentiality
FMEA
50. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
penetration
vulnerability
countermeasure
L0phtCrack