SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Used to ID failures in a complex systems to understand underlying causes of threats
CobiT
annualized loss expectancy
delayed
fault tree analysis
2. NIST risk management methodology
ISO 17799
administrative
CobiT
SP 800-30
3. Ensures managment security directives are fulfilled
vulnerability
administrative
security officer
ISO/IEC 27004
4. ISM Standard
administrative
network mapping
threat
Information Security Management
5. OCTAVE
COSO
mappers
AS/NZS 4360
Operationally Critical Threat - Asset - and Vulnerability Evaluation
6. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
vulnerability
risk analysis
FMEA
due care
7. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
CISO
Committee of Sponsoring Organizations
mappers
annualized loss expectancy
8. Type of audit that checks that accounts - groups and roles are correctly assigned
SP 800-30
privilege
COSO
chief information security officer
9. Controls that implement access control - password mangement - identification and authentication methods - configuration
network mapping
integrity
technical
risk catagories
10. A weakness (software - hardware - procedural - human) that can be exploited
chief information security officer
Committee of Sponsoring Organizations
qualitative
vulnerability
11. The following tools (Nessus - Qualys - Retina) are ______________ scanners
Facilitated Risk Analysis Process
vulnerability
ISO/IEC 27005
penetration
12. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
performance baseline
port scanner
CISO
risk
13. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
chief information security officer
L0phtCrack
ISO/IEC 27001
risk analysis
14. CISO
risk
OCTAVE
risk catagories
chief information security officer
15. Type of audit that checks information classification and change control procedures
protocol analyzer
ISO 17799
CobiT
administrative
16. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
security program
CobiT
ISO 17799
Operationally Critical Threat - Asset - and Vulnerability Evaluation
17. FRAP
COSO
BS7799
network mapping
Facilitated Risk Analysis Process
18. IT governance at the operational level
CobiT
ISO/IEC 27799
vulnerability
Information Security Management
19. A log that can record outgoing requests - incoming traffic - and internet usage
countermeasure
ISO/IEC 27004
firewall
risk catagories
20. CobiT
Control Objectives for Information and related Technology
tactical
Information Security Management
mappers
21. Focus on service level agreements between IT dept and internal customers
ITIL
Information risk management
planning horizon
FMEA
22. Information security managment measurements
physical
ITIL
Information risk management
ISO/IEC 27004
23. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
protocol analyzer
availability
CobiT
countermeasure
24. Possiblity of damage and the ramifications should it occur
risk
countermeasure
data owner
CobiT
25. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
CobiT
COSO
chief information security officer
CobiT
26. IRM
Information risk management
availability
ISO 17799
privilege
27. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
operational
john the ripper
Information risk management
threat
28. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
risk
chief information security officer
FMEA
elcomsoft
29. The asset's value multiplied by the EF percentage - (SLE)
corporate security officer
ISO/IEC 27001
single loss expectancy
COSO
30. Mitigates a potential risk
security program
countermeasure
chief information security officer
port scanner
31. Expected or predetermined performance level - developed from policy - performance - requirements
physical
OCTAVE
risk
performance baseline
32. Percentage of an asset's value that would be lost in a single incident - (EF)
Operationally Critical Threat - Asset - and Vulnerability Evaluation
CobiT
exposure factor
COSO
33. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
strategic
technical
ISO/IEC 27001
CISO
34. Collection of controls an organization must have in place
FMEA
risk analysis
security program
Information Security Management
35. Type of audit that checks procedures and policies for escalating issues to management
mappers
usage
escalation
COSO
36. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
mappers
risk catagories
COSO
john the ripper
37. Risk mgmt method with much broader focus than IT security
administrative
Facilitated Risk Analysis Process
OCTAVE
AS/NZS 4360
38. Potential danger to information or systems
Information risk management
strategic
Operationally Critical Threat - Asset - and Vulnerability Evaluation
threat
39. Daily goals focused on productivity and task-oriented activities
security program
operational
ITIL
countermeasure
40. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
tactical
vulnerability
single loss expectancy
FMEA
41. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
Committee of Sponsoring Organizations
penetration
planning horizon
administrative
42. Corporate governance at the strategic level
COSO
countermeasure
john the ripper
risk mitigation
43. Responsible for information classification and protection
ISO/IEC 27001
data owner
technical
port scanner
44. Guide to illustrate how to protect personal health information
ISO/IEC 27004
qualitative
ISO/IEC 27799
blueprints
45. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
L0phtCrack
network mapping
countermeasure
vulnerability scanner
46. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
strategic
ISO/IEC 27004
COSO
Failure Modes and Effect Analysis
47. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
network mapping
countermeasure
IRM
Committee of Sponsoring Organizations
48. Derived from the COSO framework
ISO/IEC 27005
CobiT
qualitative
risk
49. SLE x ARO - (ALE)
annualized loss expectancy
penetration
confidentiality
risk catagories
50. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
L0phtCrack
OCTAVE
OVAL
privilege
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests