SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
mappers
FMEA
security program
network mapping
2. Responsible for information classification and protection
port scanner
annualized loss expectancy
data owner
security governanace
3. IT governance at the operational level
No events - Errors only - Errors and warnings - All events
CobiT
usage
integrity
4. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
risk mitigation
CISO
performance monitor
vulnerability scanner
5. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
exposure
CobiT
firewall
physical
6. FRAP
Information risk management
firewall
COSO
Facilitated Risk Analysis Process
7. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
integrity
risk anlysis
qualitative
Information risk management
8. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
vulnerability
AS/NZS 4360
ISO/IEC 27001
Facilitated Risk Analysis Process
9. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
ISO 17799
Information Security Management
security officer
network mapping
10. A log that can record outgoing requests - incoming traffic - and internet usage
delayed
FMEA
firewall
operational
11. Type of audit that checks that network resources - systems and software are used appropriately
delayed
planning horizon
integrity
usage
12. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
FRAP
FMEA
SP 800-30
availability
13. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
fault tree analysis
blueprints
OVAL
john the ripper
14. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
ISO/IEC 27002
network mapping
CobiT
strategic
15. Midterm goals
tactical
integrity
ISO/IEC 27002
vulnerability
16. The tools - personnel and business processes necessary to ensure that security meets needs
availability
IRM
Operationally Critical Threat - Asset - and Vulnerability Evaluation
security governanace
17. Mitigates a potential risk
FMEA
Information risk management
countermeasure
Information Technology Infrastructure Library (ITIL)
18. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
administrative
risk catagories
ISO/IEC 27002
Control Objectives for Information and related Technology
19. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
penetration
vulnerability
Information risk management
due care
20. Event levels available for logging in a MS DNS server
Facilitated Risk Analysis Process
elcomsoft
No events - Errors only - Errors and warnings - All events
CobiT
21. CobiT
CobiT
Control Objectives for Information and related Technology
ISO/IEC 27001
risk analysis
22. The likelihood of exploitation and the loss potential
risk
due care
confidentiality
planning horizon
23. COSO
vulnerability
Committee of Sponsoring Organizations
vulnerability
SP 800-30
24. De facto standard of best practices for IT service mgmt
annualized loss expectancy
risk analysis
IRM
Information Technology Infrastructure Library (ITIL)
25. Derived from the COSO framework
ITIL
CobiT
strategic
Operationally Critical Threat - Asset - and Vulnerability Evaluation
26. Expected or predetermined performance level - developed from policy - performance - requirements
performance baseline
availability
CobiT
threat
27. Strategic - tactical and operational planning
planning horizon
exposure
ISO 17799
integrity
28. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
COSO
Operationally Critical Threat - Asset - and Vulnerability Evaluation
performance monitor
Control Objectives for Information and related Technology
29. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
AS/NZS 4360
risk analysis
CobiT
exposure
30. Controls that implement access control - password mangement - identification and authentication methods - configuration
FMEA
usage
technical
Operationally Critical Threat - Asset - and Vulnerability Evaluation
31. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
Information Technology Infrastructure Library (ITIL)
L0phtCrack
privilege
physical
32. __________ loss has a negative effect after a vulnerability is initially exploited
risk analysis
strategic
delayed
Information Security Management
33. Ensures reliable timely access to data/resources to authorized individuals
No events - Errors only - Errors and warnings - All events
availability
FRAP
CISO
34. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
COSO
tactical
ISO/IEC 27005
risk catagories
35. FMEA
physical
Failure Modes and Effect Analysis
performance baseline
COSO
36. ISM Standard
CISO
OVAL
Information Security Management
security program
37. OCTAVE
Operationally Critical Threat - Asset - and Vulnerability Evaluation
Failure Modes and Effect Analysis
john the ripper
CobiT
38. Potential danger to information or systems
Information Security Management
L0phtCrack
No events - Errors only - Errors and warnings - All events
threat
39. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
single loss expectancy
availability
risk mitigation
blueprints
40. Responsible for communicating to senior mgmt organizational risks and compliance regulations
port scanner
ISO 17799
corporate security officer
CISO
41. IRM
Information risk management
L0phtCrack
due care
CobiT
42. Guide assist in the implemenation of information security based on risk managent approach
COSO
ISO/IEC 27005
FMEA
security program
43. Daily goals focused on productivity and task-oriented activities
CobiT
operational
vulnerability scanner
data owner
44. Tools to ID - develop - and design security requirements for business needs
blueprints
L0phtCrack
port scanner
ISO 17799
45. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
AS/NZS 4360
CobiT
CISO
exposure factor
46. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
ISO/IEC 27005
corporate security officer
risk
port scanner
47. Ensures managment security directives are fulfilled
security officer
COSO
security governanace
vulnerability
48. Ensures necessary level of secrecy and prevents unauthorized disclosure
No events - Errors only - Errors and warnings - All events
confidentiality
risk analysis
vulnerability scanner
49. The following tools (Nessus - Qualys - Retina) are ______________ scanners
vulnerability
CISO
Failure Modes and Effect Analysis
mappers
50. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
elcomsoft
COSO
Committee of Sponsoring Organizations
vulnerability