SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
vulnerability
Control Objectives for Information and related Technology
IRM
performance monitor
2. Used to ID failures in a complex systems to understand underlying causes of threats
administrative
Control Objectives for Information and related Technology
OCTAVE
fault tree analysis
3. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
CISO
Failure Modes and Effect Analysis
risk analysis
ISO/IEC 27001
4. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
ISO/IEC 27001
data owner
risk catagories
FMEA
5. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
OCTAVE
COSO
strategic
Control Objectives for Information and related Technology
6. Controls that implement access control - password mangement - identification and authentication methods - configuration
CISO
CobiT
technical
chief information security officer
7. Midterm goals
tactical
qualitative
ISO/IEC 27005
operational
8. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
blueprints
Facilitated Risk Analysis Process
security program
vulnerability scanner
9. The following tools (Nessus - Qualys - Retina) are ______________ scanners
vulnerability
countermeasure
threat
annualized loss expectancy
10. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
Information Security Management
CobiT
port scanner
vulnerability
11. An instance of being exposed to losses from a threat
exposure
ISO/IEC 27001
annualized rate of occurrence
Operationally Critical Threat - Asset - and Vulnerability Evaluation
12. __________ loss has a negative effect after a vulnerability is initially exploited
delayed
annualized loss expectancy
countermeasure
FMEA
13. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
vulnerability
IRM
tactical
fault tree analysis
14. Potential danger to information or systems
vulnerability
OVAL
threat
risk catagories
15. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
performance monitor
strategic
vulnerability
Operationally Critical Threat - Asset - and Vulnerability Evaluation
16. Derived from the COSO framework
delayed
security program
annualized loss expectancy
CobiT
17. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
vulnerability scanner
risk anlysis
ISO 17799
administrative
18. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
risk analysis
FRAP
integrity
Facilitated Risk Analysis Process
19. NIST risk management methodology
administrative
SP 800-30
physical
COSO
20. Possiblity of damage and the ramifications should it occur
network mapping
technical
Information risk management
risk
21. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
technical
delayed
risk
protocol analyzer
22. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
FMEA
countermeasure
security program
due care
23. Daily goals focused on productivity and task-oriented activities
risk
operational
ISO 17799
ISO/IEC 27004
24. Provides a cost/benefit comparision
SP 800-30
risk analysis
mappers
john the ripper
25. De facto standard of best practices for IT service mgmt
single loss expectancy
Information Technology Infrastructure Library (ITIL)
firewall
risk analysis
26. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
elcomsoft
FMEA
annualized rate of occurrence
Operationally Critical Threat - Asset - and Vulnerability Evaluation
27. COSO
countermeasure
ISO/IEC 27005
Committee of Sponsoring Organizations
protocol analyzer
28. Type of audit that checks procedures and policies for escalating issues to management
security program
ISO/IEC 27799
escalation
single loss expectancy
29. The likelihood of exploitation and the loss potential
CobiT
CobiT
risk
risk mitigation
30. The asset's value multiplied by the EF percentage - (SLE)
vulnerability
single loss expectancy
threat
CISO
31. Ensures necessary level of secrecy and prevents unauthorized disclosure
performance baseline
Information Technology Infrastructure Library (ITIL)
annualized rate of occurrence
confidentiality
32. Event levels available for logging in a MS DNS server
risk analysis
risk anlysis
No events - Errors only - Errors and warnings - All events
CobiT
33. ISM Standard
annualized loss expectancy
Information risk management
port scanner
Information Security Management
34. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
OVAL
performance baseline
single loss expectancy
ISO/IEC 27001
35. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
vulnerability
FMEA
risk analysis
protocol analyzer
36. OCTAVE
security officer
john the ripper
single loss expectancy
Operationally Critical Threat - Asset - and Vulnerability Evaluation
37. Guide to illustrate how to protect personal health information
operational
escalation
ISO/IEC 27002
ISO/IEC 27799
38. Type of audit that checks that network resources - systems and software are used appropriately
Information risk management
corporate security officer
usage
IRM
39. Corporate governance at the strategic level
blueprints
firewall
data owner
COSO
40. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
CISO
exposure
risk
FMEA
41. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
L0phtCrack
risk analysis
exposure factor
vulnerability
42. Type of audit that checks information classification and change control procedures
administrative
technical
qualitative
ISO/IEC 27002
43. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
elcomsoft
OVAL
FMEA
ISO/IEC 27004
44. Guide assist in the implemenation of information security based on risk managent approach
strategic
ISO/IEC 27005
CobiT
network mapping
45. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
corporate security officer
security officer
No events - Errors only - Errors and warnings - All events
ISO 17799
46. FMEA
SP 800-30
ISO/IEC 27002
administrative
Failure Modes and Effect Analysis
47. Made up of ten domains - a mechanism to describe security processes
integrity
ISO/IEC 27005
CobiT
ISO 17799
48. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
OCTAVE
performance baseline
administrative
security governanace
49. CISO
chief information security officer
corporate security officer
Operationally Critical Threat - Asset - and Vulnerability Evaluation
BS7799
50. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
risk mitigation
OCTAVE
network mapping
vulnerability
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests