SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
john the ripper
Information Technology Infrastructure Library (ITIL)
FRAP
IRM
2. Assurance of accurancy and reliability of information and systems
COSO
integrity
operational
threat
3. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
Operationally Critical Threat - Asset - and Vulnerability Evaluation
john the ripper
risk anlysis
blueprints
4. Provides a cost/benefit comparision
L0phtCrack
risk analysis
confidentiality
network mapping
5. __________ loss has a negative effect after a vulnerability is initially exploited
Facilitated Risk Analysis Process
delayed
physical
Information Security Management
6. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
escalation
elcomsoft
penetration
exposure factor
7. Possiblity of damage and the ramifications should it occur
OCTAVE
risk mitigation
risk
corporate security officer
8. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
vulnerability
ISO/IEC 27002
risk mitigation
blueprints
9. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
OVAL
risk analysis
COSO
Failure Modes and Effect Analysis
10. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
fault tree analysis
IRM
performance monitor
protocol analyzer
11. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
Information risk management
tactical
operational
network mapping
12. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
risk analysis
No events - Errors only - Errors and warnings - All events
security program
countermeasure
13. Derived from the COSO framework
network mapping
CobiT
integrity
john the ripper
14. Daily goals focused on productivity and task-oriented activities
performance monitor
chief information security officer
operational
Information Technology Infrastructure Library (ITIL)
15. Responsible for communicating to senior mgmt organizational risks and compliance regulations
CISO
risk mitigation
ITIL
fault tree analysis
16. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
ISO/IEC 27004
BS7799
administrative
Operationally Critical Threat - Asset - and Vulnerability Evaluation
17. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
confidentiality
firewall
elcomsoft
qualitative
18. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
exposure factor
vulnerability
strategic
COSO
19. An instance of being exposed to losses from a threat
administrative
CISO
Information risk management
exposure
20. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
firewall
vulnerability scanner
security governanace
OVAL
21. De facto standard of best practices for IT service mgmt
vulnerability scanner
FMEA
confidentiality
Information Technology Infrastructure Library (ITIL)
22. A weakness (software - hardware - procedural - human) that can be exploited
countermeasure
vulnerability
OCTAVE
Information risk management
23. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
CobiT
Information risk management
vulnerability
L0phtCrack
24. Midterm goals
tactical
firewall
countermeasure
performance monitor
25. Risk mgmt method with much broader focus than IT security
AS/NZS 4360
ISO/IEC 27005
Operationally Critical Threat - Asset - and Vulnerability Evaluation
vulnerability
26. A log that can record outgoing requests - incoming traffic - and internet usage
security program
integrity
firewall
privilege
27. IRM
firewall
AS/NZS 4360
Information risk management
blueprints
28. Expected or predetermined performance level - developed from policy - performance - requirements
ISO 17799
confidentiality
performance monitor
performance baseline
29. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
performance monitor
countermeasure
penetration
risk analysis
30. CobiT
Control Objectives for Information and related Technology
mappers
IRM
performance baseline
31. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
BS7799
administrative
chief information security officer
technical
32. Responsible for information classification and protection
FMEA
escalation
COSO
data owner
33. FMEA
exposure factor
planning horizon
Failure Modes and Effect Analysis
FRAP
34. Guide to illustrate how to protect personal health information
strategic
ISO/IEC 27799
data owner
FMEA
35. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
performance baseline
ISO 17799
FMEA
COSO
36. Type of audit that checks procedures and policies for escalating issues to management
annualized rate of occurrence
chief information security officer
risk catagories
escalation
37. Type of audit that checks that accounts - groups and roles are correctly assigned
privilege
Information risk management
risk
security program
38. OCTAVE
physical
corporate security officer
Operationally Critical Threat - Asset - and Vulnerability Evaluation
network mapping
39. Ensures managment security directives are fulfilled
escalation
vulnerability
planning horizon
security officer
40. CISO
BS7799
CobiT
exposure factor
chief information security officer
41. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
ISO 17799
risk mitigation
CobiT
SP 800-30
42. Focus on service level agreements between IT dept and internal customers
Information Security Management
network mapping
AS/NZS 4360
ITIL
43. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
physical
annualized rate of occurrence
Information Security Management
network mapping
44. ISM Standard
integrity
Information Technology Infrastructure Library (ITIL)
risk
Information Security Management
45. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
ISO/IEC 27001
security program
physical
administrative
46. FRAP
usage
ISO/IEC 27004
Facilitated Risk Analysis Process
ISO/IEC 27799
47. COSO
Committee of Sponsoring Organizations
technical
ISO/IEC 27002
vulnerability
48. Mitigates a potential risk
countermeasure
ISO/IEC 27004
security program
port scanner
49. Type of audit that checks that network resources - systems and software are used appropriately
usage
network mapping
countermeasure
ISO/IEC 27004
50. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
single loss expectancy
risk analysis
FRAP
CobiT