SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Potential danger to information or systems
ISO/IEC 27005
Failure Modes and Effect Analysis
threat
risk
2. Number of time the incident might occur annually - (ARO)
tactical
ISO/IEC 27001
ISO 17799
annualized rate of occurrence
3. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
SP 800-30
risk catagories
escalation
due care
4. Collection of controls an organization must have in place
exposure
FMEA
security program
planning horizon
5. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
exposure
AS/NZS 4360
qualitative
vulnerability scanner
6. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
risk catagories
ISO/IEC 27001
COSO
BS7799
7. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
ISO 17799
network mapping
blueprints
administrative
8. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
BS7799
chief information security officer
ISO 17799
security program
9. NIST risk management methodology
chief information security officer
ISO/IEC 27004
Committee of Sponsoring Organizations
SP 800-30
10. Guide assist in the implemenation of information security based on risk managent approach
security officer
ISO 17799
ISO/IEC 27005
countermeasure
11. An open language from mitre.org for determining vulnerabilities and problems on computer systems
OVAL
blueprints
L0phtCrack
No events - Errors only - Errors and warnings - All events
12. De facto standard of best practices for IT service mgmt
Committee of Sponsoring Organizations
Information Technology Infrastructure Library (ITIL)
physical
ISO/IEC 27002
13. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
ITIL
OCTAVE
COSO
data owner
14. Ensures necessary level of secrecy and prevents unauthorized disclosure
FRAP
administrative
security officer
confidentiality
15. Responsible for communicating to senior mgmt organizational risks and compliance regulations
port scanner
Committee of Sponsoring Organizations
CISO
risk
16. CobiT
privilege
Control Objectives for Information and related Technology
risk
integrity
17. Event levels available for logging in a MS DNS server
security program
ISO 17799
risk
No events - Errors only - Errors and warnings - All events
18. CISO
mappers
chief information security officer
BS7799
fault tree analysis
19. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
COSO
exposure
AS/NZS 4360
privilege
20. Midterm goals
physical
elcomsoft
tactical
Operationally Critical Threat - Asset - and Vulnerability Evaluation
21. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
OCTAVE
countermeasure
L0phtCrack
privilege
22. A log that can record outgoing requests - incoming traffic - and internet usage
SP 800-30
physical
CobiT
firewall
23. Expected or predetermined performance level - developed from policy - performance - requirements
confidentiality
security governanace
data owner
performance baseline
24. Risk mgmt method with much broader focus than IT security
availability
ISO 17799
AS/NZS 4360
administrative
25. Type of audit that checks that network resources - systems and software are used appropriately
blueprints
risk mitigation
usage
tactical
26. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
FMEA
mappers
countermeasure
performance baseline
27. Assurance of accurancy and reliability of information and systems
vulnerability
risk
integrity
network mapping
28. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
strategic
FRAP
risk mitigation
FMEA
29. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
planning horizon
performance monitor
Committee of Sponsoring Organizations
Information risk management
30. The tools - personnel and business processes necessary to ensure that security meets needs
L0phtCrack
security governanace
vulnerability
COSO
31. The likelihood of exploitation and the loss potential
chief information security officer
annualized rate of occurrence
risk
performance monitor
32. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
FRAP
BS7799
OVAL
planning horizon
33. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
risk
strategic
vulnerability scanner
CISO
34. COSO
Committee of Sponsoring Organizations
OVAL
ISO 17799
integrity
35. The asset's value multiplied by the EF percentage - (SLE)
risk
single loss expectancy
strategic
security governanace
36. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
vulnerability scanner
john the ripper
firewall
ITIL
37. Mitigates a potential risk
usage
countermeasure
chief information security officer
fault tree analysis
38. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
blueprints
BS7799
Committee of Sponsoring Organizations
AS/NZS 4360
39. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
technical
CISO
delayed
ISO 17799
40. Tools to ID - develop - and design security requirements for business needs
Failure Modes and Effect Analysis
annualized loss expectancy
vulnerability
blueprints
41. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
ISO/IEC 27002
firewall
single loss expectancy
Facilitated Risk Analysis Process
42. Made up of ten domains - a mechanism to describe security processes
vulnerability
risk anlysis
elcomsoft
ISO 17799
43. Possiblity of damage and the ramifications should it occur
Operationally Critical Threat - Asset - and Vulnerability Evaluation
administrative
risk
john the ripper
44. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
performance monitor
technical
strategic
countermeasure
45. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
elcomsoft
COSO
risk
planning horizon
46. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
penetration
CobiT
security program
ISO/IEC 27001
47. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
risk mitigation
security program
physical
FMEA
48. Type of audit that checks procedures and policies for escalating issues to management
Information risk management
risk analysis
risk analysis
escalation
49. FMEA
firewall
COSO
ISO/IEC 27002
Failure Modes and Effect Analysis
50. Focus on service level agreements between IT dept and internal customers
delayed
COSO
Information risk management
ITIL