Test your basic knowledge |

Comptia Security +: Assessment And Risk Mgmt

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion






2. An instance of being exposed to losses from a threat






3. __________ loss has a negative effect after a vulnerability is initially exploited






4. NIST risk management methodology






5. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)






6. Ensures managment security directives are fulfilled






7. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks






8. Ensures reliable timely access to data/resources to authorized individuals






9. OCTAVE






10. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs






11. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits






12. SLE x ARO - (ALE)






13. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control






14. Focus on service level agreements between IT dept and internal customers






15. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation






16. IT governance at the operational level






17. FMEA






18. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment






19. Number of time the incident might occur annually - (ARO)






20. Risk mgmt method with much broader focus than IT security






21. Assurance of accurancy and reliability of information and systems






22. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards






23. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate






24. A weakness (software - hardware - procedural - human) that can be exploited






25. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics






26. FRAP






27. Collection of controls an organization must have in place






28. A log that can record outgoing requests - incoming traffic - and internet usage






29. Daily goals focused on productivity and task-oriented activities






30. Event levels available for logging in a MS DNS server






31. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________






32. COSO






33. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)






34. Corporate governance at the strategic level






35. Controls that implement access control - password mangement - identification and authentication methods - configuration






36. ISM Standard






37. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental






38. Responsible for communicating to senior mgmt organizational risks and compliance regulations






39. Strategic - tactical and operational planning






40. Provides a cost/benefit comparision






41. CSO






42. Used to predict changes based on trends - detect deviations - and watch events across multiple system components






43. Type of audit that checks that accounts - groups and roles are correctly assigned






44. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis






45. Percentage of an asset's value that would be lost in a single incident - (EF)






46. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate






47. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)






48. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering






49. IRM






50. Guide to illustrate how to protect personal health information