SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A log that can record outgoing requests - incoming traffic - and internet usage
ISO 17799
vulnerability scanner
firewall
port scanner
2. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
Control Objectives for Information and related Technology
risk
IRM
COSO
3. Responsible for information classification and protection
data owner
ISO/IEC 27005
Committee of Sponsoring Organizations
strategic
4. The tools - personnel and business processes necessary to ensure that security meets needs
availability
physical
FMEA
security governanace
5. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
OCTAVE
administrative
risk
availability
6. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
network mapping
data owner
security program
CobiT
7. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
COSO
network mapping
IRM
due care
8. Provides a cost/benefit comparision
port scanner
tactical
risk analysis
SP 800-30
9. The asset's value multiplied by the EF percentage - (SLE)
administrative
single loss expectancy
mappers
Information risk management
10. ISM Standard
ISO/IEC 27004
Information Security Management
COSO
FMEA
11. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
annualized rate of occurrence
protocol analyzer
Information Technology Infrastructure Library (ITIL)
OCTAVE
12. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
ISO/IEC 27005
risk anlysis
protocol analyzer
annualized rate of occurrence
13. Expected or predetermined performance level - developed from policy - performance - requirements
annualized rate of occurrence
performance baseline
firewall
L0phtCrack
14. Guide assist in the implemenation of information security based on risk managent approach
OCTAVE
confidentiality
ISO/IEC 27005
ISO/IEC 27002
15. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
vulnerability
escalation
performance baseline
mappers
16. Guide to illustrate how to protect personal health information
ISO/IEC 27799
planning horizon
FRAP
risk anlysis
17. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
port scanner
elcomsoft
vulnerability
exposure factor
18. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
vulnerability
annualized rate of occurrence
vulnerability scanner
risk mitigation
19. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
vulnerability
CISO
security officer
administrative
20. Strategic - tactical and operational planning
planning horizon
FRAP
technical
FMEA
21. A weakness (software - hardware - procedural - human) that can be exploited
CobiT
security program
vulnerability
administrative
22. Number of time the incident might occur annually - (ARO)
vulnerability scanner
annualized rate of occurrence
CISO
integrity
23. De facto standard of best practices for IT service mgmt
Information Technology Infrastructure Library (ITIL)
OCTAVE
FMEA
delayed
24. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
Information risk management
FMEA
escalation
ISO/IEC 27001
25. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
planning horizon
penetration
john the ripper
vulnerability
26. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
annualized loss expectancy
CobiT
john the ripper
FRAP
27. __________ loss has a negative effect after a vulnerability is initially exploited
due care
BS7799
corporate security officer
delayed
28. CISO
risk analysis
network mapping
chief information security officer
mappers
29. Ensures managment security directives are fulfilled
ISO/IEC 27799
ISO/IEC 27002
security officer
risk catagories
30. FRAP
Facilitated Risk Analysis Process
elcomsoft
mappers
performance monitor
31. Type of audit that checks information classification and change control procedures
administrative
risk catagories
exposure
security governanace
32. Midterm goals
tactical
data owner
Committee of Sponsoring Organizations
CISO
33. The following tools (Nessus - Qualys - Retina) are ______________ scanners
privilege
vulnerability
administrative
single loss expectancy
34. Made up of ten domains - a mechanism to describe security processes
vulnerability
port scanner
exposure factor
ISO 17799
35. Responsible for communicating to senior mgmt organizational risks and compliance regulations
CISO
COSO
technical
CobiT
36. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
ISO/IEC 27002
due care
ISO 17799
ISO/IEC 27799
37. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
FRAP
fault tree analysis
annualized rate of occurrence
COSO
38. Type of audit that checks that network resources - systems and software are used appropriately
usage
ISO/IEC 27001
corporate security officer
risk mitigation
39. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
Failure Modes and Effect Analysis
data owner
ISO 17799
COSO
40. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
blueprints
security program
ISO/IEC 27005
risk
41. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
SP 800-30
BS7799
risk
COSO
42. Ensures reliable timely access to data/resources to authorized individuals
ISO 17799
port scanner
availability
Information Security Management
43. Potential danger to information or systems
due care
threat
ISO 17799
vulnerability scanner
44. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
elcomsoft
vulnerability
COSO
FMEA
45. COSO
Committee of Sponsoring Organizations
ISO 17799
annualized loss expectancy
Control Objectives for Information and related Technology
46. Tools to ID - develop - and design security requirements for business needs
COSO
performance baseline
Information risk management
blueprints
47. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
network mapping
risk analysis
ISO 17799
physical
48. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
elcomsoft
ISO/IEC 27799
annualized rate of occurrence
blueprints
49. Type of audit that checks that accounts - groups and roles are correctly assigned
tactical
security program
vulnerability
privilege
50. An open language from mitre.org for determining vulnerabilities and problems on computer systems
OVAL
confidentiality
administrative
risk anlysis