SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
operational
security governanace
risk catagories
COSO
2. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
risk
security officer
network mapping
risk analysis
3. Tools to ID - develop - and design security requirements for business needs
blueprints
risk analysis
annualized loss expectancy
COSO
4. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
Failure Modes and Effect Analysis
protocol analyzer
FMEA
Facilitated Risk Analysis Process
5. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
availability
port scanner
risk anlysis
CobiT
6. De facto standard of best practices for IT service mgmt
fault tree analysis
Operationally Critical Threat - Asset - and Vulnerability Evaluation
Information Technology Infrastructure Library (ITIL)
ISO/IEC 27005
7. FRAP
fault tree analysis
Facilitated Risk Analysis Process
annualized rate of occurrence
protocol analyzer
8. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
CobiT
Failure Modes and Effect Analysis
risk analysis
john the ripper
9. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
operational
CobiT
CobiT
FRAP
10. Collection of controls an organization must have in place
security program
protocol analyzer
risk mitigation
vulnerability
11. CSO
performance monitor
corporate security officer
vulnerability scanner
Information risk management
12. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
threat
fault tree analysis
Operationally Critical Threat - Asset - and Vulnerability Evaluation
CISO
13. The following tools (Nessus - Qualys - Retina) are ______________ scanners
Information Security Management
SP 800-30
risk analysis
vulnerability
14. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
COSO
Information Technology Infrastructure Library (ITIL)
data owner
AS/NZS 4360
15. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
CISO
FMEA
operational
availability
16. IT governance at the operational level
CobiT
threat
Facilitated Risk Analysis Process
vulnerability
17. Responsible for communicating to senior mgmt organizational risks and compliance regulations
FMEA
port scanner
FMEA
CISO
18. NIST risk management methodology
SP 800-30
fault tree analysis
COSO
exposure factor
19. Expected or predetermined performance level - developed from policy - performance - requirements
security governanace
network mapping
network mapping
performance baseline
20. Used to ID failures in a complex systems to understand underlying causes of threats
privilege
Failure Modes and Effect Analysis
Committee of Sponsoring Organizations
fault tree analysis
21. FMEA
ITIL
network mapping
Failure Modes and Effect Analysis
countermeasure
22. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
exposure
CobiT
penetration
network mapping
23. Ensures managment security directives are fulfilled
protocol analyzer
security officer
confidentiality
OVAL
24. Responsible for information classification and protection
exposure
Committee of Sponsoring Organizations
Information risk management
data owner
25. Ensures necessary level of secrecy and prevents unauthorized disclosure
privilege
strategic
network mapping
confidentiality
26. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
privilege
L0phtCrack
mappers
SP 800-30
27. CISO
operational
chief information security officer
single loss expectancy
security program
28. A weakness (software - hardware - procedural - human) that can be exploited
mappers
operational
vulnerability
performance baseline
29. The asset's value multiplied by the EF percentage - (SLE)
vulnerability
security program
elcomsoft
single loss expectancy
30. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
qualitative
mappers
single loss expectancy
Information Technology Infrastructure Library (ITIL)
31. Number of time the incident might occur annually - (ARO)
firewall
annualized rate of occurrence
risk analysis
single loss expectancy
32. Risk mgmt method with much broader focus than IT security
countermeasure
risk anlysis
AS/NZS 4360
vulnerability
33. Focus on service level agreements between IT dept and internal customers
Control Objectives for Information and related Technology
ITIL
planning horizon
integrity
34. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
CobiT
risk mitigation
john the ripper
qualitative
35. Strategic - tactical and operational planning
planning horizon
risk analysis
Failure Modes and Effect Analysis
network mapping
36. Made up of ten domains - a mechanism to describe security processes
security officer
ISO 17799
CobiT
vulnerability scanner
37. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
BS7799
firewall
single loss expectancy
security program
38. Mitigates a potential risk
ISO/IEC 27004
AS/NZS 4360
countermeasure
risk
39. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
vulnerability
CobiT
planning horizon
physical
40. Percentage of an asset's value that would be lost in a single incident - (EF)
Facilitated Risk Analysis Process
exposure factor
risk catagories
administrative
41. Event levels available for logging in a MS DNS server
network mapping
risk
COSO
No events - Errors only - Errors and warnings - All events
42. A log that can record outgoing requests - incoming traffic - and internet usage
escalation
COSO
tactical
firewall
43. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
due care
administrative
chief information security officer
ITIL
44. Type of audit that checks that network resources - systems and software are used appropriately
L0phtCrack
penetration
exposure factor
usage
45. Corporate governance at the strategic level
Control Objectives for Information and related Technology
usage
operational
COSO
46. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
privilege
penetration
risk anlysis
Information Security Management
47. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
risk
Failure Modes and Effect Analysis
ISO 17799
IRM
48. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
Control Objectives for Information and related Technology
network mapping
vulnerability scanner
john the ripper
49. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
risk analysis
protocol analyzer
performance monitor
privilege
50. Midterm goals
tactical
vulnerability
risk anlysis
risk