SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IRM
protocol analyzer
strategic
CobiT
Information risk management
2. Type of audit that checks information classification and change control procedures
Committee of Sponsoring Organizations
administrative
ISO 17799
OCTAVE
3. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
protocol analyzer
SP 800-30
threat
data owner
4. ISM Standard
strategic
Information Security Management
fault tree analysis
network mapping
5. OCTAVE
operational
network mapping
Operationally Critical Threat - Asset - and Vulnerability Evaluation
corporate security officer
6. CISO
chief information security officer
Information Security Management
ISO/IEC 27002
exposure factor
7. De facto standard of best practices for IT service mgmt
FRAP
Information Technology Infrastructure Library (ITIL)
COSO
countermeasure
8. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
network mapping
administrative
ISO/IEC 27799
tactical
9. CobiT
CobiT
CobiT
Control Objectives for Information and related Technology
ISO/IEC 27002
10. FRAP
administrative
FMEA
CISO
Facilitated Risk Analysis Process
11. The tools - personnel and business processes necessary to ensure that security meets needs
FRAP
risk analysis
security governanace
mappers
12. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
COSO
protocol analyzer
OCTAVE
Failure Modes and Effect Analysis
13. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
exposure
L0phtCrack
availability
performance monitor
14. An instance of being exposed to losses from a threat
IRM
exposure
ISO/IEC 27004
penetration
15. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
SP 800-30
L0phtCrack
administrative
physical
16. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
fault tree analysis
ISO/IEC 27799
port scanner
vulnerability scanner
17. Responsible for communicating to senior mgmt organizational risks and compliance regulations
single loss expectancy
risk
operational
CISO
18. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
risk catagories
Failure Modes and Effect Analysis
john the ripper
IRM
19. Guide to illustrate how to protect personal health information
security governanace
performance monitor
ISO/IEC 27799
risk
20. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
FMEA
port scanner
Information Security Management
administrative
21. Strategic - tactical and operational planning
planning horizon
performance baseline
Information Technology Infrastructure Library (ITIL)
Operationally Critical Threat - Asset - and Vulnerability Evaluation
22. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
risk
CobiT
ISO/IEC 27001
COSO
23. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
risk mitigation
vulnerability scanner
CobiT
Failure Modes and Effect Analysis
24. Controls that implement access control - password mangement - identification and authentication methods - configuration
technical
corporate security officer
Information Security Management
CobiT
25. Focus on service level agreements between IT dept and internal customers
countermeasure
ITIL
OVAL
strategic
26. An open language from mitre.org for determining vulnerabilities and problems on computer systems
OVAL
chief information security officer
COSO
OCTAVE
27. Guide assist in the implemenation of information security based on risk managent approach
FMEA
IRM
exposure
ISO/IEC 27005
28. Potential danger to information or systems
Failure Modes and Effect Analysis
administrative
qualitative
threat
29. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
qualitative
vulnerability
elcomsoft
physical
30. Midterm goals
countermeasure
tactical
elcomsoft
BS7799
31. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
penetration
vulnerability
escalation
CobiT
32. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
ISO 17799
data owner
FRAP
mappers
33. A weakness (software - hardware - procedural - human) that can be exploited
No events - Errors only - Errors and warnings - All events
risk catagories
FRAP
vulnerability
34. __________ loss has a negative effect after a vulnerability is initially exploited
single loss expectancy
delayed
security program
vulnerability
35. Type of audit that checks that accounts - groups and roles are correctly assigned
administrative
Committee of Sponsoring Organizations
tactical
privilege
36. CSO
chief information security officer
Control Objectives for Information and related Technology
vulnerability scanner
corporate security officer
37. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
Information Security Management
technical
ISO/IEC 27001
physical
38. Assurance of accurancy and reliability of information and systems
tactical
Committee of Sponsoring Organizations
due care
integrity
39. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
COSO
threat
SP 800-30
elcomsoft
40. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
Committee of Sponsoring Organizations
IRM
due care
CobiT
41. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
L0phtCrack
blueprints
administrative
vulnerability
42. Corporate governance at the strategic level
CISO
vulnerability
Information risk management
COSO
43. The asset's value multiplied by the EF percentage - (SLE)
FMEA
network mapping
single loss expectancy
fault tree analysis
44. The likelihood of exploitation and the loss potential
ISO/IEC 27001
qualitative
annualized loss expectancy
risk
45. SLE x ARO - (ALE)
COSO
annualized loss expectancy
OCTAVE
due care
46. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
L0phtCrack
Information risk management
CobiT
security governanace
47. FMEA
physical
technical
Failure Modes and Effect Analysis
annualized loss expectancy
48. Event levels available for logging in a MS DNS server
penetration
Information risk management
No events - Errors only - Errors and warnings - All events
ISO/IEC 27004
49. Ensures reliable timely access to data/resources to authorized individuals
COSO
availability
Failure Modes and Effect Analysis
Information Security Management
50. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
escalation
due care
FRAP
ISO 17799