SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
Information risk management
delayed
risk
ISO/IEC 27002
2. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
chief information security officer
COSO
blueprints
risk analysis
3. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
SP 800-30
Operationally Critical Threat - Asset - and Vulnerability Evaluation
penetration
L0phtCrack
4. Guide assist in the implemenation of information security based on risk managent approach
administrative
ISO/IEC 27799
ISO/IEC 27005
Information Security Management
5. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
OVAL
tactical
ISO 17799
exposure factor
6. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
risk catagories
countermeasure
risk mitigation
due care
7. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
OCTAVE
administrative
Failure Modes and Effect Analysis
Information Security Management
8. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
risk
OCTAVE
privilege
fault tree analysis
9. The tools - personnel and business processes necessary to ensure that security meets needs
security governanace
risk
ISO/IEC 27001
vulnerability
10. COSO
Facilitated Risk Analysis Process
Committee of Sponsoring Organizations
corporate security officer
CobiT
11. __________ loss has a negative effect after a vulnerability is initially exploited
security program
administrative
delayed
physical
12. Mitigates a potential risk
elcomsoft
Operationally Critical Threat - Asset - and Vulnerability Evaluation
usage
countermeasure
13. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
annualized rate of occurrence
vulnerability
ISO/IEC 27004
ISO/IEC 27001
14. Made up of ten domains - a mechanism to describe security processes
ISO/IEC 27004
No events - Errors only - Errors and warnings - All events
ISO 17799
administrative
15. IT governance at the operational level
vulnerability
CobiT
risk analysis
countermeasure
16. FMEA
physical
Failure Modes and Effect Analysis
corporate security officer
chief information security officer
17. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
john the ripper
exposure
CobiT
ISO 17799
18. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
risk
elcomsoft
penetration
risk catagories
19. Strategic - tactical and operational planning
firewall
OCTAVE
planning horizon
elcomsoft
20. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
ISO/IEC 27002
Failure Modes and Effect Analysis
vulnerability scanner
FMEA
21. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
FMEA
exposure factor
CISO
Information Technology Infrastructure Library (ITIL)
22. CSO
vulnerability
operational
annualized rate of occurrence
corporate security officer
23. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
Failure Modes and Effect Analysis
FMEA
CISO
risk
24. Potential danger to information or systems
vulnerability
threat
physical
FMEA
25. An instance of being exposed to losses from a threat
risk
ISO/IEC 27005
L0phtCrack
exposure
26. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
FMEA
performance monitor
risk catagories
IRM
27. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
BS7799
single loss expectancy
protocol analyzer
SP 800-30
28. Type of audit that checks information classification and change control procedures
CISO
security governanace
administrative
technical
29. Ensures managment security directives are fulfilled
COSO
security officer
data owner
chief information security officer
30. FRAP
OVAL
administrative
Facilitated Risk Analysis Process
fault tree analysis
31. The likelihood of exploitation and the loss potential
administrative
risk
operational
ISO/IEC 27004
32. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
FMEA
L0phtCrack
risk analysis
exposure
33. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
COSO
network mapping
vulnerability
tactical
34. Controls that implement access control - password mangement - identification and authentication methods - configuration
escalation
confidentiality
mappers
technical
35. Percentage of an asset's value that would be lost in a single incident - (EF)
BS7799
FRAP
OCTAVE
exposure factor
36. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
administrative
tactical
performance monitor
FMEA
37. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
administrative
IRM
qualitative
Failure Modes and Effect Analysis
38. Collection of controls an organization must have in place
threat
security program
countermeasure
Committee of Sponsoring Organizations
39. Possiblity of damage and the ramifications should it occur
integrity
blueprints
confidentiality
risk
40. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
ISO 17799
risk catagories
Facilitated Risk Analysis Process
CISO
41. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
COSO
integrity
CISO
delayed
42. Derived from the COSO framework
chief information security officer
CobiT
No events - Errors only - Errors and warnings - All events
operational
43. Type of audit that checks procedures and policies for escalating issues to management
john the ripper
port scanner
escalation
AS/NZS 4360
44. CISO
ISO/IEC 27004
COSO
chief information security officer
ISO/IEC 27002
45. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
protocol analyzer
usage
risk
qualitative
46. Responsible for information classification and protection
CISO
BS7799
data owner
vulnerability
47. Provides a cost/benefit comparision
security governanace
risk analysis
usage
ISO/IEC 27001
48. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
FMEA
security governanace
AS/NZS 4360
risk anlysis
49. Number of time the incident might occur annually - (ARO)
ISO 17799
privilege
FMEA
annualized rate of occurrence
50. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
IRM
risk catagories
mappers
elcomsoft