SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
ITIL
ISO 17799
AS/NZS 4360
Control Objectives for Information and related Technology
2. Tools to ID - develop - and design security requirements for business needs
Information Technology Infrastructure Library (ITIL)
john the ripper
blueprints
fault tree analysis
3. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
FRAP
ISO/IEC 27002
CobiT
ISO/IEC 27004
4. Expected or predetermined performance level - developed from policy - performance - requirements
integrity
risk analysis
performance monitor
performance baseline
5. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
OCTAVE
physical
qualitative
vulnerability
6. Responsible for communicating to senior mgmt organizational risks and compliance regulations
integrity
penetration
network mapping
CISO
7. An instance of being exposed to losses from a threat
privilege
exposure
data owner
planning horizon
8. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
FMEA
Information Technology Infrastructure Library (ITIL)
john the ripper
BS7799
9. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
firewall
network mapping
exposure
due care
10. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
ISO/IEC 27004
CobiT
annualized loss expectancy
technical
11. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
qualitative
fault tree analysis
risk analysis
risk catagories
12. OCTAVE
planning horizon
risk
elcomsoft
Operationally Critical Threat - Asset - and Vulnerability Evaluation
13. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
single loss expectancy
risk anlysis
CobiT
IRM
14. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
countermeasure
risk
performance monitor
ITIL
15. CISO
chief information security officer
due care
vulnerability
Information Security Management
16. Ensures managment security directives are fulfilled
OCTAVE
security program
chief information security officer
security officer
17. __________ loss has a negative effect after a vulnerability is initially exploited
ISO/IEC 27799
Information risk management
mappers
delayed
18. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
risk catagories
CobiT
single loss expectancy
blueprints
19. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
ISO 17799
COSO
escalation
risk analysis
20. Provides a cost/benefit comparision
risk analysis
vulnerability
Facilitated Risk Analysis Process
data owner
21. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
Committee of Sponsoring Organizations
ISO 17799
risk analysis
FMEA
22. An open language from mitre.org for determining vulnerabilities and problems on computer systems
annualized rate of occurrence
OVAL
CISO
planning horizon
23. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
data owner
CobiT
FRAP
ISO/IEC 27001
24. Collection of controls an organization must have in place
Control Objectives for Information and related Technology
countermeasure
security program
blueprints
25. SLE x ARO - (ALE)
COSO
annualized loss expectancy
CISO
OVAL
26. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
penetration
privilege
integrity
CobiT
27. Used to ID failures in a complex systems to understand underlying causes of threats
fault tree analysis
security governanace
exposure factor
physical
28. Risk mgmt method with much broader focus than IT security
ISO/IEC 27001
availability
AS/NZS 4360
ITIL
29. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
privilege
corporate security officer
data owner
OCTAVE
30. FMEA
vulnerability
Failure Modes and Effect Analysis
john the ripper
exposure
31. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
IRM
tactical
port scanner
COSO
32. Percentage of an asset's value that would be lost in a single incident - (EF)
SP 800-30
exposure factor
physical
ISO 17799
33. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
CISO
security officer
usage
administrative
34. Ensures reliable timely access to data/resources to authorized individuals
penetration
ITIL
network mapping
availability
35. COSO
elcomsoft
Committee of Sponsoring Organizations
single loss expectancy
threat
36. Number of time the incident might occur annually - (ARO)
annualized rate of occurrence
vulnerability scanner
risk
qualitative
37. Assurance of accurancy and reliability of information and systems
administrative
risk catagories
ISO/IEC 27005
integrity
38. De facto standard of best practices for IT service mgmt
fault tree analysis
delayed
mappers
Information Technology Infrastructure Library (ITIL)
39. The tools - personnel and business processes necessary to ensure that security meets needs
technical
physical
security governanace
AS/NZS 4360
40. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
risk mitigation
network mapping
fault tree analysis
ISO/IEC 27005
41. NIST risk management methodology
delayed
threat
SP 800-30
vulnerability
42. Possiblity of damage and the ramifications should it occur
risk
ISO/IEC 27799
corporate security officer
Committee of Sponsoring Organizations
43. Midterm goals
tactical
chief information security officer
vulnerability
Failure Modes and Effect Analysis
44. Daily goals focused on productivity and task-oriented activities
operational
Information Technology Infrastructure Library (ITIL)
Information risk management
FMEA
45. Made up of ten domains - a mechanism to describe security processes
risk
ISO 17799
corporate security officer
confidentiality
46. FRAP
fault tree analysis
single loss expectancy
Facilitated Risk Analysis Process
Failure Modes and Effect Analysis
47. A weakness (software - hardware - procedural - human) that can be exploited
vulnerability
qualitative
blueprints
ISO 17799
48. Guide assist in the implemenation of information security based on risk managent approach
ISO/IEC 27005
john the ripper
CobiT
CobiT
49. Type of audit that checks that network resources - systems and software are used appropriately
usage
delayed
john the ripper
ITIL
50. Strategic - tactical and operational planning
administrative
FRAP
planning horizon
AS/NZS 4360