SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Midterm goals
protocol analyzer
fault tree analysis
tactical
due care
2. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
risk catagories
protocol analyzer
penetration
network mapping
3. Type of audit that checks procedures and policies for escalating issues to management
risk analysis
CISO
escalation
risk analysis
4. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
BS7799
risk catagories
due care
ISO/IEC 27001
5. Focus on service level agreements between IT dept and internal customers
qualitative
port scanner
tactical
ITIL
6. SLE x ARO - (ALE)
annualized loss expectancy
ISO/IEC 27004
CISO
network mapping
7. Ensures reliable timely access to data/resources to authorized individuals
availability
CobiT
COSO
administrative
8. CSO
port scanner
firewall
single loss expectancy
corporate security officer
9. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
technical
due care
FRAP
strategic
10. Controls that implement access control - password mangement - identification and authentication methods - configuration
COSO
threat
technical
Facilitated Risk Analysis Process
11. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
ISO/IEC 27005
qualitative
ISO 17799
Operationally Critical Threat - Asset - and Vulnerability Evaluation
12. Type of audit that checks that network resources - systems and software are used appropriately
usage
CISO
qualitative
IRM
13. CobiT
Control Objectives for Information and related Technology
operational
physical
john the ripper
14. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
ISO/IEC 27004
qualitative
ISO/IEC 27001
Information risk management
15. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
escalation
network mapping
ISO 17799
qualitative
16. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
ISO/IEC 27005
ISO/IEC 27799
L0phtCrack
threat
17. Type of audit that checks that accounts - groups and roles are correctly assigned
confidentiality
Information risk management
penetration
privilege
18. A log that can record outgoing requests - incoming traffic - and internet usage
administrative
CISO
network mapping
firewall
19. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
john the ripper
fault tree analysis
annualized loss expectancy
vulnerability scanner
20. FRAP
physical
OCTAVE
Facilitated Risk Analysis Process
port scanner
21. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
risk catagories
port scanner
usage
exposure
22. Collection of controls an organization must have in place
security program
risk
annualized loss expectancy
OVAL
23. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
integrity
security governanace
usage
network mapping
24. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
availability
strategic
risk mitigation
COSO
25. Expected or predetermined performance level - developed from policy - performance - requirements
security program
risk analysis
No events - Errors only - Errors and warnings - All events
performance baseline
26. Guide to illustrate how to protect personal health information
risk catagories
ISO/IEC 27799
vulnerability
operational
27. ISM Standard
exposure
Information Security Management
security officer
AS/NZS 4360
28. Strategic - tactical and operational planning
chief information security officer
planning horizon
COSO
administrative
29. De facto standard of best practices for IT service mgmt
ITIL
blueprints
Information Technology Infrastructure Library (ITIL)
ISO 17799
30. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
CISO
vulnerability
physical
delayed
31. Derived from the COSO framework
CobiT
Operationally Critical Threat - Asset - and Vulnerability Evaluation
CISO
penetration
32. A weakness (software - hardware - procedural - human) that can be exploited
vulnerability
CobiT
qualitative
Information Security Management
33. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
COSO
CISO
vulnerability
security program
34. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
CobiT
privilege
exposure
OCTAVE
35. Ensures necessary level of secrecy and prevents unauthorized disclosure
confidentiality
security officer
elcomsoft
ISO/IEC 27002
36. Number of time the incident might occur annually - (ARO)
IRM
chief information security officer
annualized rate of occurrence
Information Security Management
37. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
network mapping
ISO 17799
Facilitated Risk Analysis Process
elcomsoft
38. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
exposure
operational
protocol analyzer
CobiT
39. Responsible for information classification and protection
administrative
FMEA
data owner
Failure Modes and Effect Analysis
40. The likelihood of exploitation and the loss potential
Information risk management
firewall
risk
ISO/IEC 27002
41. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
due care
CISO
performance baseline
risk anlysis
42. Responsible for communicating to senior mgmt organizational risks and compliance regulations
network mapping
CISO
technical
vulnerability
43. The tools - personnel and business processes necessary to ensure that security meets needs
CobiT
physical
penetration
security governanace
44. Potential danger to information or systems
Information Security Management
protocol analyzer
threat
SP 800-30
45. Assurance of accurancy and reliability of information and systems
Failure Modes and Effect Analysis
Operationally Critical Threat - Asset - and Vulnerability Evaluation
risk mitigation
integrity
46. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
risk mitigation
protocol analyzer
ISO/IEC 27004
BS7799
47. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
FMEA
risk mitigation
exposure
privilege
48. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
Committee of Sponsoring Organizations
single loss expectancy
FMEA
Failure Modes and Effect Analysis
49. CISO
firewall
integrity
chief information security officer
annualized rate of occurrence
50. Tools to ID - develop - and design security requirements for business needs
OVAL
usage
delayed
blueprints