SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. __________ loss has a negative effect after a vulnerability is initially exploited
performance baseline
delayed
OVAL
Committee of Sponsoring Organizations
2. IRM
delayed
IRM
OCTAVE
Information risk management
3. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
confidentiality
Operationally Critical Threat - Asset - and Vulnerability Evaluation
FRAP
delayed
4. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
Facilitated Risk Analysis Process
Information risk management
CISO
IRM
5. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
qualitative
FRAP
Control Objectives for Information and related Technology
risk
6. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
fault tree analysis
risk
IRM
COSO
7. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
administrative
protocol analyzer
delayed
COSO
8. Mitigates a potential risk
administrative
countermeasure
tactical
integrity
9. Expected or predetermined performance level - developed from policy - performance - requirements
network mapping
mappers
performance baseline
CISO
10. An open language from mitre.org for determining vulnerabilities and problems on computer systems
OCTAVE
corporate security officer
COSO
OVAL
11. Daily goals focused on productivity and task-oriented activities
Information risk management
elcomsoft
SP 800-30
operational
12. CISO
annualized rate of occurrence
chief information security officer
ISO/IEC 27002
COSO
13. An instance of being exposed to losses from a threat
vulnerability
exposure
countermeasure
Control Objectives for Information and related Technology
14. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
L0phtCrack
planning horizon
confidentiality
Committee of Sponsoring Organizations
15. CobiT
Control Objectives for Information and related Technology
vulnerability scanner
Facilitated Risk Analysis Process
risk mitigation
16. Type of audit that checks procedures and policies for escalating issues to management
IRM
escalation
tactical
risk analysis
17. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
security program
Information Security Management
Operationally Critical Threat - Asset - and Vulnerability Evaluation
CobiT
18. The asset's value multiplied by the EF percentage - (SLE)
single loss expectancy
FMEA
ISO/IEC 27005
countermeasure
19. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
IRM
port scanner
CISO
escalation
20. The likelihood of exploitation and the loss potential
annualized loss expectancy
risk
privilege
security officer
21. Ensures reliable timely access to data/resources to authorized individuals
availability
ISO/IEC 27001
BS7799
FRAP
22. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
port scanner
risk
risk anlysis
FRAP
23. Derived from the COSO framework
ITIL
CobiT
annualized loss expectancy
single loss expectancy
24. Guide assist in the implemenation of information security based on risk managent approach
availability
Information Security Management
CobiT
ISO/IEC 27005
25. FRAP
performance monitor
john the ripper
Facilitated Risk Analysis Process
network mapping
26. Controls that implement access control - password mangement - identification and authentication methods - configuration
technical
security officer
FMEA
risk catagories
27. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
delayed
security officer
performance baseline
vulnerability scanner
28. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
physical
data owner
performance monitor
Information Technology Infrastructure Library (ITIL)
29. Risk mgmt method with much broader focus than IT security
exposure factor
AS/NZS 4360
corporate security officer
IRM
30. Assurance of accurancy and reliability of information and systems
COSO
administrative
integrity
operational
31. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
Facilitated Risk Analysis Process
CISO
john the ripper
COSO
32. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
FMEA
ISO/IEC 27005
CobiT
network mapping
33. Provides a cost/benefit comparision
integrity
exposure factor
risk analysis
risk anlysis
34. Midterm goals
tactical
integrity
usage
No events - Errors only - Errors and warnings - All events
35. Percentage of an asset's value that would be lost in a single incident - (EF)
ITIL
exposure factor
firewall
network mapping
36. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
CISO
Information Security Management
vulnerability scanner
performance baseline
37. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
exposure
due care
firewall
performance monitor
38. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
risk catagories
OVAL
FMEA
Operationally Critical Threat - Asset - and Vulnerability Evaluation
39. Information security managment measurements
network mapping
privilege
risk catagories
ISO/IEC 27004
40. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
ISO/IEC 27001
CobiT
planning horizon
elcomsoft
41. De facto standard of best practices for IT service mgmt
security officer
IRM
FMEA
Information Technology Infrastructure Library (ITIL)
42. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
escalation
elcomsoft
network mapping
administrative
43. NIST risk management methodology
SP 800-30
ISO/IEC 27004
OCTAVE
ISO/IEC 27799
44. Type of audit that checks that accounts - groups and roles are correctly assigned
privilege
risk analysis
ISO/IEC 27004
ISO/IEC 27005
45. SLE x ARO - (ALE)
tactical
countermeasure
corporate security officer
annualized loss expectancy
46. Strategic - tactical and operational planning
Committee of Sponsoring Organizations
ISO 17799
vulnerability
planning horizon
47. Tools to ID - develop - and design security requirements for business needs
penetration
planning horizon
blueprints
risk analysis
48. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
port scanner
strategic
due care
network mapping
49. A log that can record outgoing requests - incoming traffic - and internet usage
risk mitigation
ISO/IEC 27799
penetration
firewall
50. Made up of ten domains - a mechanism to describe security processes
OVAL
ISO/IEC 27799
security program
ISO 17799