SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
performance baseline
No events - Errors only - Errors and warnings - All events
administrative
BS7799
2. Type of audit that checks that accounts - groups and roles are correctly assigned
privilege
threat
Information risk management
BS7799
3. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
privilege
COSO
risk anlysis
performance baseline
4. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
Operationally Critical Threat - Asset - and Vulnerability Evaluation
administrative
qualitative
AS/NZS 4360
5. De facto standard of best practices for IT service mgmt
Information Technology Infrastructure Library (ITIL)
chief information security officer
ISO/IEC 27001
COSO
6. Ensures reliable timely access to data/resources to authorized individuals
availability
vulnerability
CobiT
OCTAVE
7. Collection of controls an organization must have in place
security program
tactical
Information Technology Infrastructure Library (ITIL)
IRM
8. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
ISO 17799
physical
No events - Errors only - Errors and warnings - All events
single loss expectancy
9. NIST risk management methodology
vulnerability
CobiT
performance baseline
SP 800-30
10. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
COSO
physical
administrative
vulnerability scanner
11. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
risk catagories
risk mitigation
security governanace
security officer
12. Number of time the incident might occur annually - (ARO)
vulnerability
vulnerability
Information Technology Infrastructure Library (ITIL)
annualized rate of occurrence
13. Guide assist in the implemenation of information security based on risk managent approach
ISO/IEC 27005
CISO
ISO/IEC 27002
protocol analyzer
14. Provides a cost/benefit comparision
penetration
risk analysis
technical
qualitative
15. Type of audit that checks information classification and change control procedures
firewall
blueprints
confidentiality
administrative
16. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
integrity
protocol analyzer
BS7799
single loss expectancy
17. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
administrative
network mapping
Control Objectives for Information and related Technology
risk catagories
18. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
risk analysis
L0phtCrack
Facilitated Risk Analysis Process
tactical
19. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
risk analysis
COSO
BS7799
ISO/IEC 27799
20. An open language from mitre.org for determining vulnerabilities and problems on computer systems
john the ripper
OVAL
COSO
risk analysis
21. Event levels available for logging in a MS DNS server
No events - Errors only - Errors and warnings - All events
security program
port scanner
risk
22. CISO
ISO/IEC 27799
elcomsoft
chief information security officer
Information Technology Infrastructure Library (ITIL)
23. ISM Standard
Information Security Management
Committee of Sponsoring Organizations
Information Technology Infrastructure Library (ITIL)
risk analysis
24. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
corporate security officer
network mapping
due care
Information Technology Infrastructure Library (ITIL)
25. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
CobiT
ISO/IEC 27004
qualitative
operational
26. Potential danger to information or systems
john the ripper
network mapping
threat
network mapping
27. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
threat
CobiT
FMEA
Information Security Management
28. OCTAVE
privilege
Operationally Critical Threat - Asset - and Vulnerability Evaluation
single loss expectancy
confidentiality
29. Used to ID failures in a complex systems to understand underlying causes of threats
delayed
fault tree analysis
Control Objectives for Information and related Technology
performance monitor
30. FMEA
IRM
vulnerability
Operationally Critical Threat - Asset - and Vulnerability Evaluation
Failure Modes and Effect Analysis
31. The asset's value multiplied by the EF percentage - (SLE)
penetration
single loss expectancy
ISO/IEC 27004
risk anlysis
32. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
john the ripper
confidentiality
OCTAVE
single loss expectancy
33. Type of audit that checks that network resources - systems and software are used appropriately
firewall
ISO/IEC 27004
risk analysis
usage
34. Tools to ID - develop - and design security requirements for business needs
risk mitigation
strategic
blueprints
Facilitated Risk Analysis Process
35. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
qualitative
vulnerability
mappers
Committee of Sponsoring Organizations
36. Risk mgmt method with much broader focus than IT security
AS/NZS 4360
corporate security officer
network mapping
ITIL
37. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
OVAL
ISO/IEC 27002
chief information security officer
physical
38. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
network mapping
usage
penetration
tactical
39. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
risk catagories
ISO/IEC 27004
physical
ITIL
40. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
risk analysis
CISO
risk catagories
ISO/IEC 27001
41. Ensures necessary level of secrecy and prevents unauthorized disclosure
ISO 17799
confidentiality
protocol analyzer
Failure Modes and Effect Analysis
42. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
performance monitor
Information Security Management
SP 800-30
ISO 17799
43. CSO
john the ripper
risk anlysis
CobiT
corporate security officer
44. COSO
AS/NZS 4360
CISO
performance baseline
Committee of Sponsoring Organizations
45. A weakness (software - hardware - procedural - human) that can be exploited
firewall
COSO
vulnerability
penetration
46. A log that can record outgoing requests - incoming traffic - and internet usage
strategic
firewall
vulnerability
Operationally Critical Threat - Asset - and Vulnerability Evaluation
47. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
Failure Modes and Effect Analysis
firewall
vulnerability
performance monitor
48. Made up of ten domains - a mechanism to describe security processes
Operationally Critical Threat - Asset - and Vulnerability Evaluation
ISO 17799
usage
administrative
49. CobiT
vulnerability
risk analysis
mappers
Control Objectives for Information and related Technology
50. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
physical
confidentiality
ITIL
port scanner