SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Midterm goals
port scanner
technical
exposure
tactical
2. Corporate governance at the strategic level
risk analysis
security program
BS7799
COSO
3. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
security program
risk analysis
chief information security officer
FMEA
4. The tools - personnel and business processes necessary to ensure that security meets needs
FMEA
administrative
security governanace
exposure factor
5. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
administrative
single loss expectancy
mappers
strategic
6. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
administrative
Operationally Critical Threat - Asset - and Vulnerability Evaluation
technical
security program
7. Guide to illustrate how to protect personal health information
integrity
Information Technology Infrastructure Library (ITIL)
ISO/IEC 27799
usage
8. CSO
corporate security officer
elcomsoft
security program
vulnerability
9. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
ISO/IEC 27001
BS7799
Facilitated Risk Analysis Process
qualitative
10. IT governance at the operational level
john the ripper
network mapping
usage
CobiT
11. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
physical
administrative
ITIL
FRAP
12. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
chief information security officer
due care
qualitative
FMEA
13. NIST risk management methodology
SP 800-30
technical
john the ripper
risk anlysis
14. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
ISO/IEC 27002
single loss expectancy
integrity
IRM
15. Expected or predetermined performance level - developed from policy - performance - requirements
john the ripper
risk
Control Objectives for Information and related Technology
performance baseline
16. Ensures managment security directives are fulfilled
network mapping
john the ripper
vulnerability
security officer
17. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
COSO
network mapping
administrative
FMEA
18. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
CobiT
tactical
IRM
Information Security Management
19. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
CobiT
john the ripper
vulnerability
elcomsoft
20. Responsible for communicating to senior mgmt organizational risks and compliance regulations
COSO
CISO
COSO
countermeasure
21. OCTAVE
Operationally Critical Threat - Asset - and Vulnerability Evaluation
Facilitated Risk Analysis Process
corporate security officer
threat
22. An open language from mitre.org for determining vulnerabilities and problems on computer systems
CobiT
chief information security officer
confidentiality
OVAL
23. De facto standard of best practices for IT service mgmt
Information Technology Infrastructure Library (ITIL)
Failure Modes and Effect Analysis
usage
SP 800-30
24. Mitigates a potential risk
Information Technology Infrastructure Library (ITIL)
countermeasure
Information risk management
security program
25. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
annualized loss expectancy
OCTAVE
availability
ISO/IEC 27799
26. Type of audit that checks that network resources - systems and software are used appropriately
Information risk management
performance monitor
mappers
usage
27. Possiblity of damage and the ramifications should it occur
CISO
countermeasure
risk
corporate security officer
28. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
strategic
exposure
firewall
mappers
29. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
annualized rate of occurrence
L0phtCrack
network mapping
firewall
30. Strategic - tactical and operational planning
planning horizon
administrative
annualized rate of occurrence
ISO/IEC 27004
31. Responsible for information classification and protection
threat
integrity
data owner
countermeasure
32. Number of time the incident might occur annually - (ARO)
annualized rate of occurrence
CobiT
exposure
vulnerability
33. The asset's value multiplied by the EF percentage - (SLE)
blueprints
single loss expectancy
availability
exposure
34. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
security program
ISO 17799
CobiT
risk catagories
35. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
Facilitated Risk Analysis Process
risk
operational
network mapping
36. Daily goals focused on productivity and task-oriented activities
risk mitigation
performance baseline
firewall
operational
37. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
Facilitated Risk Analysis Process
chief information security officer
risk
COSO
38. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
OVAL
security governanace
ISO/IEC 27799
COSO
39. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
FMEA
annualized rate of occurrence
penetration
performance monitor
40. Used to ID failures in a complex systems to understand underlying causes of threats
qualitative
CobiT
fault tree analysis
administrative
41. Type of audit that checks information classification and change control procedures
network mapping
administrative
CobiT
ISO 17799
42. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
tactical
vulnerability
COSO
risk analysis
43. Collection of controls an organization must have in place
Control Objectives for Information and related Technology
qualitative
corporate security officer
security program
44. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
ISO/IEC 27001
CobiT
penetration
protocol analyzer
45. IRM
CobiT
Information risk management
network mapping
fault tree analysis
46. Made up of ten domains - a mechanism to describe security processes
planning horizon
ISO 17799
OCTAVE
physical
47. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
availability
security governanace
FRAP
port scanner
48. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
ISO/IEC 27002
operational
mappers
vulnerability
49. A weakness (software - hardware - procedural - human) that can be exploited
vulnerability
CobiT
ISO/IEC 27005
COSO
50. Assurance of accurancy and reliability of information and systems
integrity
CobiT
COSO
Facilitated Risk Analysis Process