SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Guide to illustrate how to protect personal health information
planning horizon
COSO
ISO/IEC 27799
ISO 17799
2. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
administrative
CISO
privilege
IRM
3. Possiblity of damage and the ramifications should it occur
risk
risk anlysis
exposure
vulnerability
4. Ensures reliable timely access to data/resources to authorized individuals
availability
exposure
Information Security Management
due care
5. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
vulnerability
blueprints
availability
Information Security Management
6. Corporate governance at the strategic level
ISO/IEC 27005
risk mitigation
COSO
network mapping
7. The following tools (Nessus - Qualys - Retina) are ______________ scanners
vulnerability
Information Security Management
Operationally Critical Threat - Asset - and Vulnerability Evaluation
ISO 17799
8. FMEA
Failure Modes and Effect Analysis
security program
L0phtCrack
AS/NZS 4360
9. CSO
qualitative
single loss expectancy
corporate security officer
vulnerability scanner
10. Potential danger to information or systems
threat
john the ripper
AS/NZS 4360
IRM
11. IT governance at the operational level
administrative
firewall
port scanner
CobiT
12. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
vulnerability scanner
confidentiality
Information Security Management
john the ripper
13. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
network mapping
data owner
fault tree analysis
ISO/IEC 27004
14. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
OVAL
single loss expectancy
penetration
L0phtCrack
15. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
vulnerability scanner
vulnerability
COSO
ISO/IEC 27001
16. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
confidentiality
BS7799
SP 800-30
security officer
17. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
security program
penetration
risk catagories
Failure Modes and Effect Analysis
18. Provides a cost/benefit comparision
availability
Information Technology Infrastructure Library (ITIL)
risk analysis
firewall
19. Midterm goals
ISO/IEC 27001
tactical
AS/NZS 4360
usage
20. Responsible for information classification and protection
data owner
fault tree analysis
annualized loss expectancy
CobiT
21. Ensures managment security directives are fulfilled
security officer
delayed
network mapping
strategic
22. A weakness (software - hardware - procedural - human) that can be exploited
vulnerability
operational
COSO
administrative
23. COSO
Committee of Sponsoring Organizations
protocol analyzer
elcomsoft
threat
24. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
performance monitor
CobiT
availability
planning horizon
25. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
FRAP
john the ripper
privilege
COSO
26. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
L0phtCrack
performance monitor
exposure
confidentiality
27. CobiT
Control Objectives for Information and related Technology
FMEA
risk analysis
technical
28. SLE x ARO - (ALE)
OVAL
security governanace
annualized loss expectancy
exposure
29. Type of audit that checks that network resources - systems and software are used appropriately
CobiT
usage
OVAL
Operationally Critical Threat - Asset - and Vulnerability Evaluation
30. Made up of ten domains - a mechanism to describe security processes
ISO 17799
physical
network mapping
Information Technology Infrastructure Library (ITIL)
31. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
risk mitigation
port scanner
FMEA
firewall
32. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
qualitative
security governanace
tactical
COSO
33. Derived from the COSO framework
risk anlysis
IRM
CobiT
vulnerability
34. The asset's value multiplied by the EF percentage - (SLE)
single loss expectancy
CobiT
corporate security officer
usage
35. Mitigates a potential risk
CobiT
Facilitated Risk Analysis Process
ISO 17799
countermeasure
36. Percentage of an asset's value that would be lost in a single incident - (EF)
COSO
strategic
exposure factor
ISO 17799
37. OCTAVE
threat
security program
performance monitor
Operationally Critical Threat - Asset - and Vulnerability Evaluation
38. Controls that implement access control - password mangement - identification and authentication methods - configuration
technical
Control Objectives for Information and related Technology
risk analysis
ISO/IEC 27799
39. Assurance of accurancy and reliability of information and systems
integrity
performance monitor
Failure Modes and Effect Analysis
risk analysis
40. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
SP 800-30
physical
risk analysis
COSO
41. Responsible for communicating to senior mgmt organizational risks and compliance regulations
ISO 17799
CobiT
risk analysis
CISO
42. Used to ID failures in a complex systems to understand underlying causes of threats
corporate security officer
fault tree analysis
mappers
penetration
43. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
exposure
Information Security Management
administrative
single loss expectancy
44. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
ISO/IEC 27005
ITIL
CobiT
ISO/IEC 27002
45. Daily goals focused on productivity and task-oriented activities
operational
penetration
network mapping
protocol analyzer
46. Guide assist in the implemenation of information security based on risk managent approach
ISO/IEC 27005
Control Objectives for Information and related Technology
ISO 17799
ISO/IEC 27799
47. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
COSO
elcomsoft
SP 800-30
tactical
48. Collection of controls an organization must have in place
availability
security program
risk mitigation
administrative
49. Type of audit that checks information classification and change control procedures
COSO
risk
COSO
administrative
50. Type of audit that checks procedures and policies for escalating issues to management
CISO
escalation
countermeasure
ITIL