SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Assurance of accurancy and reliability of information and systems
corporate security officer
qualitative
integrity
performance monitor
2. The likelihood of exploitation and the loss potential
network mapping
ISO 17799
risk
IRM
3. Strategic - tactical and operational planning
physical
planning horizon
FMEA
chief information security officer
4. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
FMEA
data owner
Information risk management
elcomsoft
5. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
security program
protocol analyzer
risk catagories
integrity
6. COSO
Committee of Sponsoring Organizations
risk analysis
CobiT
COSO
7. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
performance baseline
risk anlysis
port scanner
Operationally Critical Threat - Asset - and Vulnerability Evaluation
8. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
ISO/IEC 27001
No events - Errors only - Errors and warnings - All events
elcomsoft
CISO
9. Corporate governance at the strategic level
integrity
administrative
COSO
vulnerability
10. An open language from mitre.org for determining vulnerabilities and problems on computer systems
Control Objectives for Information and related Technology
risk
FMEA
OVAL
11. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
vulnerability
network mapping
Operationally Critical Threat - Asset - and Vulnerability Evaluation
COSO
12. Collection of controls an organization must have in place
security officer
CISO
network mapping
security program
13. Used to ID failures in a complex systems to understand underlying causes of threats
fault tree analysis
security program
tactical
data owner
14. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
SP 800-30
ISO/IEC 27001
Operationally Critical Threat - Asset - and Vulnerability Evaluation
risk mitigation
15. The tools - personnel and business processes necessary to ensure that security meets needs
due care
administrative
Information Security Management
security governanace
16. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
escalation
ISO 17799
COSO
john the ripper
17. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
availability
CobiT
administrative
single loss expectancy
18. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
Control Objectives for Information and related Technology
strategic
delayed
network mapping
19. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
administrative
Information risk management
vulnerability
risk mitigation
20. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
performance monitor
Operationally Critical Threat - Asset - and Vulnerability Evaluation
CobiT
port scanner
21. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
ISO 17799
strategic
elcomsoft
physical
22. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
qualitative
FMEA
chief information security officer
IRM
23. Provides a cost/benefit comparision
ISO/IEC 27799
risk analysis
planning horizon
annualized rate of occurrence
24. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
BS7799
network mapping
ISO/IEC 27799
COSO
25. Type of audit that checks that accounts - groups and roles are correctly assigned
FMEA
privilege
security officer
risk mitigation
26. The following tools (Nessus - Qualys - Retina) are ______________ scanners
L0phtCrack
Facilitated Risk Analysis Process
risk analysis
vulnerability
27. Responsible for communicating to senior mgmt organizational risks and compliance regulations
ISO 17799
protocol analyzer
CISO
FMEA
28. FMEA
ISO/IEC 27001
AS/NZS 4360
Failure Modes and Effect Analysis
annualized loss expectancy
29. Number of time the incident might occur annually - (ARO)
annualized rate of occurrence
exposure factor
Failure Modes and Effect Analysis
single loss expectancy
30. Guide assist in the implemenation of information security based on risk managent approach
technical
security program
physical
ISO/IEC 27005
31. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
security officer
exposure
Control Objectives for Information and related Technology
vulnerability
32. An instance of being exposed to losses from a threat
Operationally Critical Threat - Asset - and Vulnerability Evaluation
elcomsoft
exposure
risk
33. Potential danger to information or systems
COSO
threat
availability
due care
34. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
john the ripper
fault tree analysis
risk catagories
vulnerability
35. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
ISO/IEC 27005
ISO/IEC 27001
risk anlysis
risk analysis
36. Risk mgmt method with much broader focus than IT security
security officer
risk catagories
AS/NZS 4360
administrative
37. Derived from the COSO framework
CobiT
network mapping
FRAP
qualitative
38. Mitigates a potential risk
CISO
countermeasure
performance baseline
Control Objectives for Information and related Technology
39. SLE x ARO - (ALE)
annualized loss expectancy
IRM
ISO/IEC 27799
chief information security officer
40. Ensures managment security directives are fulfilled
security officer
usage
physical
threat
41. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
delayed
FMEA
ISO 17799
Committee of Sponsoring Organizations
42. De facto standard of best practices for IT service mgmt
CISO
COSO
Information Technology Infrastructure Library (ITIL)
physical
43. NIST risk management methodology
risk
tactical
SP 800-30
OVAL
44. IT governance at the operational level
corporate security officer
CobiT
privilege
FMEA
45. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
Control Objectives for Information and related Technology
elcomsoft
administrative
usage
46. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
OCTAVE
risk catagories
protocol analyzer
ISO 17799
47. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
network mapping
ISO/IEC 27004
FMEA
vulnerability
48. Guide to illustrate how to protect personal health information
vulnerability
ISO/IEC 27799
Operationally Critical Threat - Asset - and Vulnerability Evaluation
protocol analyzer
49. IRM
performance monitor
FMEA
technical
Information risk management
50. Type of audit that checks information classification and change control procedures
administrative
ISO 17799
risk analysis
FRAP