SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Ensures necessary level of secrecy and prevents unauthorized disclosure
threat
risk analysis
due care
confidentiality
2. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
threat
mappers
security governanace
exposure factor
3. Risk mgmt method with much broader focus than IT security
corporate security officer
SP 800-30
AS/NZS 4360
port scanner
4. Assurance of accurancy and reliability of information and systems
performance monitor
risk
technical
integrity
5. The asset's value multiplied by the EF percentage - (SLE)
Information Security Management
firewall
performance baseline
single loss expectancy
6. Event levels available for logging in a MS DNS server
risk catagories
No events - Errors only - Errors and warnings - All events
vulnerability
SP 800-30
7. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
corporate security officer
COSO
availability
Committee of Sponsoring Organizations
8. An instance of being exposed to losses from a threat
security officer
exposure
CobiT
ISO/IEC 27004
9. Ensures reliable timely access to data/resources to authorized individuals
CobiT
vulnerability
availability
Information risk management
10. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
OCTAVE
technical
confidentiality
john the ripper
11. Guide to illustrate how to protect personal health information
ISO/IEC 27005
risk
ISO/IEC 27799
risk anlysis
12. An open language from mitre.org for determining vulnerabilities and problems on computer systems
performance monitor
usage
protocol analyzer
OVAL
13. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
L0phtCrack
physical
due care
data owner
14. Midterm goals
tactical
Information Technology Infrastructure Library (ITIL)
strategic
ISO/IEC 27002
15. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
risk anlysis
network mapping
BS7799
COSO
16. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
qualitative
SP 800-30
Control Objectives for Information and related Technology
vulnerability
17. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
mappers
ISO/IEC 27004
risk analysis
vulnerability
18. Type of audit that checks that network resources - systems and software are used appropriately
usage
mappers
confidentiality
security program
19. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
SP 800-30
planning horizon
tactical
ISO 17799
20. Controls that implement access control - password mangement - identification and authentication methods - configuration
technical
FMEA
physical
due care
21. Expected or predetermined performance level - developed from policy - performance - requirements
qualitative
CobiT
physical
performance baseline
22. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
ISO 17799
firewall
annualized loss expectancy
risk catagories
23. CSO
physical
corporate security officer
countermeasure
privilege
24. Possiblity of damage and the ramifications should it occur
corporate security officer
risk
CISO
port scanner
25. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
risk analysis
Information Technology Infrastructure Library (ITIL)
mappers
network mapping
26. The following tools (Nessus - Qualys - Retina) are ______________ scanners
SP 800-30
Failure Modes and Effect Analysis
vulnerability
network mapping
27. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
CobiT
risk catagories
risk analysis
FMEA
28. Mitigates a potential risk
tactical
SP 800-30
countermeasure
single loss expectancy
29. Type of audit that checks that accounts - groups and roles are correctly assigned
vulnerability scanner
ISO/IEC 27005
Information Technology Infrastructure Library (ITIL)
privilege
30. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
CISO
strategic
CobiT
operational
31. IRM
tactical
CISO
Information risk management
SP 800-30
32. Tools to ID - develop - and design security requirements for business needs
vulnerability
blueprints
Failure Modes and Effect Analysis
technical
33. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
FMEA
exposure
risk
SP 800-30
34. Daily goals focused on productivity and task-oriented activities
Committee of Sponsoring Organizations
CISO
strategic
operational
35. Guide assist in the implemenation of information security based on risk managent approach
No events - Errors only - Errors and warnings - All events
ISO/IEC 27005
BS7799
Committee of Sponsoring Organizations
36. Corporate governance at the strategic level
integrity
COSO
firewall
risk mitigation
37. FRAP
technical
physical
Facilitated Risk Analysis Process
exposure factor
38. OCTAVE
tactical
privilege
planning horizon
Operationally Critical Threat - Asset - and Vulnerability Evaluation
39. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
performance monitor
administrative
countermeasure
integrity
40. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
annualized rate of occurrence
No events - Errors only - Errors and warnings - All events
CISO
COSO
41. __________ loss has a negative effect after a vulnerability is initially exploited
vulnerability
Operationally Critical Threat - Asset - and Vulnerability Evaluation
ISO 17799
delayed
42. Percentage of an asset's value that would be lost in a single incident - (EF)
FMEA
physical
exposure factor
vulnerability scanner
43. Collection of controls an organization must have in place
firewall
AS/NZS 4360
strategic
security program
44. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
threat
CobiT
risk mitigation
ISO/IEC 27001
45. Strategic - tactical and operational planning
planning horizon
exposure
FRAP
ISO/IEC 27799
46. A log that can record outgoing requests - incoming traffic - and internet usage
L0phtCrack
firewall
risk mitigation
FMEA
47. Responsible for communicating to senior mgmt organizational risks and compliance regulations
Information risk management
CISO
CobiT
qualitative
48. The tools - personnel and business processes necessary to ensure that security meets needs
security governanace
ISO/IEC 27002
IRM
ISO 17799
49. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
L0phtCrack
vulnerability
risk mitigation
risk catagories
50. NIST risk management methodology
CobiT
SP 800-30
FMEA
network mapping