SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Used to ID failures in a complex systems to understand underlying causes of threats
L0phtCrack
vulnerability
fault tree analysis
data owner
2. The asset's value multiplied by the EF percentage - (SLE)
penetration
single loss expectancy
IRM
CobiT
3. A weakness (software - hardware - procedural - human) that can be exploited
vulnerability
exposure
threat
ISO 17799
4. SLE x ARO - (ALE)
annualized loss expectancy
network mapping
chief information security officer
security officer
5. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
CobiT
elcomsoft
ISO/IEC 27001
vulnerability scanner
6. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
FRAP
Information risk management
FMEA
security program
7. FMEA
blueprints
risk
elcomsoft
Failure Modes and Effect Analysis
8. An open language from mitre.org for determining vulnerabilities and problems on computer systems
CobiT
strategic
COSO
OVAL
9. Made up of ten domains - a mechanism to describe security processes
BS7799
ISO/IEC 27005
ISO 17799
ITIL
10. ISM Standard
ISO/IEC 27002
risk anlysis
Information Security Management
Facilitated Risk Analysis Process
11. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
Information Technology Infrastructure Library (ITIL)
port scanner
vulnerability scanner
AS/NZS 4360
12. IRM
COSO
exposure
Information risk management
elcomsoft
13. Midterm goals
integrity
tactical
confidentiality
performance monitor
14. De facto standard of best practices for IT service mgmt
COSO
SP 800-30
Information Technology Infrastructure Library (ITIL)
privilege
15. Daily goals focused on productivity and task-oriented activities
ISO/IEC 27002
operational
Control Objectives for Information and related Technology
single loss expectancy
16. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
CobiT
network mapping
COSO
COSO
17. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
CISO
protocol analyzer
Committee of Sponsoring Organizations
ISO/IEC 27001
18. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
Facilitated Risk Analysis Process
risk analysis
BS7799
performance baseline
19. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
vulnerability
tactical
Information Security Management
security officer
20. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
countermeasure
vulnerability
ISO/IEC 27799
performance monitor
21. Event levels available for logging in a MS DNS server
COSO
penetration
No events - Errors only - Errors and warnings - All events
countermeasure
22. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
Committee of Sponsoring Organizations
strategic
due care
integrity
23. Mitigates a potential risk
tactical
countermeasure
threat
CISO
24. IT governance at the operational level
Failure Modes and Effect Analysis
CobiT
Committee of Sponsoring Organizations
risk
25. CobiT
Control Objectives for Information and related Technology
availability
Operationally Critical Threat - Asset - and Vulnerability Evaluation
risk analysis
26. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
security program
ISO/IEC 27002
Information risk management
vulnerability scanner
27. Type of audit that checks that accounts - groups and roles are correctly assigned
escalation
Information Security Management
ISO/IEC 27004
privilege
28. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
annualized rate of occurrence
OCTAVE
SP 800-30
Facilitated Risk Analysis Process
29. The tools - personnel and business processes necessary to ensure that security meets needs
security governanace
technical
due care
data owner
30. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
BS7799
security program
network mapping
vulnerability
31. Type of audit that checks that network resources - systems and software are used appropriately
usage
security program
No events - Errors only - Errors and warnings - All events
risk anlysis
32. __________ loss has a negative effect after a vulnerability is initially exploited
ISO 17799
operational
delayed
ISO/IEC 27799
33. Possiblity of damage and the ramifications should it occur
risk
exposure
security program
ITIL
34. The likelihood of exploitation and the loss potential
security officer
ITIL
ISO/IEC 27004
risk
35. Risk mgmt method with much broader focus than IT security
performance baseline
risk analysis
risk
AS/NZS 4360
36. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
planning horizon
Information Technology Infrastructure Library (ITIL)
CobiT
mappers
37. CISO
risk analysis
elcomsoft
planning horizon
chief information security officer
38. A log that can record outgoing requests - incoming traffic - and internet usage
vulnerability
firewall
risk
BS7799
39. Type of audit that checks information classification and change control procedures
security governanace
security officer
security program
administrative
40. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
vulnerability scanner
COSO
planning horizon
network mapping
41. Number of time the incident might occur annually - (ARO)
mappers
corporate security officer
due care
annualized rate of occurrence
42. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
penetration
FMEA
Failure Modes and Effect Analysis
security program
43. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
COSO
security program
risk catagories
Failure Modes and Effect Analysis
44. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
network mapping
protocol analyzer
penetration
CISO
45. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
Information risk management
technical
CobiT
network mapping
46. Derived from the COSO framework
penetration
CobiT
exposure
ISO/IEC 27002
47. The following tools (Nessus - Qualys - Retina) are ______________ scanners
vulnerability
operational
tactical
Facilitated Risk Analysis Process
48. Guide assist in the implemenation of information security based on risk managent approach
risk catagories
ISO/IEC 27005
Facilitated Risk Analysis Process
escalation
49. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
Information Technology Infrastructure Library (ITIL)
protocol analyzer
vulnerability
COSO
50. Provides a cost/benefit comparision
risk analysis
strategic
single loss expectancy
delayed