SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
CISO
performance baseline
L0phtCrack
security program
2. Type of audit that checks that accounts - groups and roles are correctly assigned
usage
privilege
Control Objectives for Information and related Technology
ITIL
3. CobiT
delayed
COSO
Operationally Critical Threat - Asset - and Vulnerability Evaluation
Control Objectives for Information and related Technology
4. Made up of ten domains - a mechanism to describe security processes
performance monitor
vulnerability
ISO 17799
BS7799
5. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
countermeasure
IRM
security officer
FMEA
6. An open language from mitre.org for determining vulnerabilities and problems on computer systems
confidentiality
delayed
CobiT
OVAL
7. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
ISO 17799
FMEA
Facilitated Risk Analysis Process
CobiT
8. A weakness (software - hardware - procedural - human) that can be exploited
vulnerability
mappers
AS/NZS 4360
L0phtCrack
9. Type of audit that checks information classification and change control procedures
administrative
network mapping
AS/NZS 4360
Information risk management
10. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
COSO
risk
vulnerability
OCTAVE
11. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
port scanner
network mapping
FMEA
vulnerability
12. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
due care
ISO 17799
risk anlysis
security officer
13. A log that can record outgoing requests - incoming traffic - and internet usage
CobiT
firewall
FRAP
planning horizon
14. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
protocol analyzer
vulnerability
chief information security officer
CobiT
15. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
administrative
countermeasure
operational
FMEA
16. Focus on service level agreements between IT dept and internal customers
performance monitor
ITIL
AS/NZS 4360
fault tree analysis
17. The tools - personnel and business processes necessary to ensure that security meets needs
security governanace
tactical
port scanner
FMEA
18. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
countermeasure
risk mitigation
single loss expectancy
CobiT
19. IT governance at the operational level
CobiT
tactical
security governanace
ISO/IEC 27005
20. COSO
vulnerability
exposure
Committee of Sponsoring Organizations
Control Objectives for Information and related Technology
21. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
mappers
ISO 17799
OCTAVE
Operationally Critical Threat - Asset - and Vulnerability Evaluation
22. Ensures necessary level of secrecy and prevents unauthorized disclosure
confidentiality
risk analysis
ISO/IEC 27001
FMEA
23. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
integrity
ISO 17799
elcomsoft
usage
24. The following tools (Nessus - Qualys - Retina) are ______________ scanners
Operationally Critical Threat - Asset - and Vulnerability Evaluation
vulnerability
IRM
Information risk management
25. Event levels available for logging in a MS DNS server
Facilitated Risk Analysis Process
risk
usage
No events - Errors only - Errors and warnings - All events
26. Midterm goals
tactical
Control Objectives for Information and related Technology
OVAL
physical
27. Percentage of an asset's value that would be lost in a single incident - (EF)
exposure factor
annualized rate of occurrence
L0phtCrack
Information Technology Infrastructure Library (ITIL)
28. Tools to ID - develop - and design security requirements for business needs
Failure Modes and Effect Analysis
L0phtCrack
blueprints
annualized loss expectancy
29. Responsible for communicating to senior mgmt organizational risks and compliance regulations
CobiT
data owner
CISO
annualized loss expectancy
30. Ensures managment security directives are fulfilled
COSO
security officer
usage
IRM
31. ISM Standard
single loss expectancy
Information Security Management
fault tree analysis
confidentiality
32. SLE x ARO - (ALE)
annualized loss expectancy
IRM
COSO
blueprints
33. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
Control Objectives for Information and related Technology
escalation
COSO
vulnerability scanner
34. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
ITIL
ISO/IEC 27001
risk catagories
penetration
35. Collection of controls an organization must have in place
elcomsoft
security program
vulnerability
integrity
36. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
corporate security officer
availability
COSO
performance monitor
37. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
ISO/IEC 27001
No events - Errors only - Errors and warnings - All events
Facilitated Risk Analysis Process
integrity
38. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
penetration
risk catagories
annualized rate of occurrence
L0phtCrack
39. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
ISO 17799
elcomsoft
CISO
FMEA
40. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
ISO/IEC 27001
security program
due care
qualitative
41. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
mappers
Information Technology Infrastructure Library (ITIL)
penetration
privilege
42. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
CobiT
AS/NZS 4360
ISO 17799
L0phtCrack
43. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
exposure
CobiT
qualitative
risk anlysis
44. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
Control Objectives for Information and related Technology
performance monitor
due care
port scanner
45. An instance of being exposed to losses from a threat
security program
vulnerability
security governanace
exposure
46. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
blueprints
performance monitor
OCTAVE
Control Objectives for Information and related Technology
47. Derived from the COSO framework
ISO 17799
Facilitated Risk Analysis Process
CobiT
mappers
48. OCTAVE
countermeasure
Operationally Critical Threat - Asset - and Vulnerability Evaluation
threat
blueprints
49. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
COSO
confidentiality
risk anlysis
qualitative
50. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
vulnerability
CobiT
ISO/IEC 27004
ISO/IEC 27005