SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
delayed
Facilitated Risk Analysis Process
protocol analyzer
qualitative
2. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
Committee of Sponsoring Organizations
exposure
COSO
OVAL
3. OCTAVE
Facilitated Risk Analysis Process
Operationally Critical Threat - Asset - and Vulnerability Evaluation
FRAP
Control Objectives for Information and related Technology
4. __________ loss has a negative effect after a vulnerability is initially exploited
CISO
delayed
integrity
security program
5. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
OCTAVE
risk
CobiT
L0phtCrack
6. Made up of ten domains - a mechanism to describe security processes
ISO 17799
CISO
Committee of Sponsoring Organizations
tactical
7. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
risk catagories
Information Technology Infrastructure Library (ITIL)
protocol analyzer
elcomsoft
8. Derived from the COSO framework
CobiT
technical
risk analysis
strategic
9. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
BS7799
network mapping
COSO
risk
10. The tools - personnel and business processes necessary to ensure that security meets needs
COSO
tactical
security governanace
technical
11. A log that can record outgoing requests - incoming traffic - and internet usage
FMEA
firewall
risk
annualized rate of occurrence
12. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
port scanner
risk catagories
penetration
CobiT
13. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
ISO/IEC 27799
qualitative
technical
FMEA
14. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
administrative
Facilitated Risk Analysis Process
COSO
ISO/IEC 27002
15. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
risk
strategic
CobiT
ISO/IEC 27002
16. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
vulnerability
FMEA
security governanace
risk mitigation
17. De facto standard of best practices for IT service mgmt
data owner
Information Technology Infrastructure Library (ITIL)
risk anlysis
availability
18. Risk mgmt method with much broader focus than IT security
FMEA
AS/NZS 4360
risk analysis
delayed
19. CSO
annualized loss expectancy
single loss expectancy
performance baseline
corporate security officer
20. Mitigates a potential risk
countermeasure
exposure
CISO
ISO/IEC 27002
21. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
CobiT
risk
vulnerability scanner
usage
22. FMEA
Failure Modes and Effect Analysis
Information risk management
IRM
chief information security officer
23. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
CobiT
elcomsoft
qualitative
SP 800-30
24. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
IRM
security governanace
security program
ISO/IEC 27001
25. Guide to illustrate how to protect personal health information
risk anlysis
ISO/IEC 27799
network mapping
integrity
26. Event levels available for logging in a MS DNS server
availability
risk mitigation
No events - Errors only - Errors and warnings - All events
countermeasure
27. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
john the ripper
COSO
mappers
ISO/IEC 27799
28. SLE x ARO - (ALE)
fault tree analysis
FRAP
exposure
annualized loss expectancy
29. ISM Standard
annualized rate of occurrence
Information Security Management
planning horizon
elcomsoft
30. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
FMEA
ISO 17799
security program
FRAP
31. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
AS/NZS 4360
risk
administrative
vulnerability
32. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
security program
Information Technology Infrastructure Library (ITIL)
annualized rate of occurrence
due care
33. IT governance at the operational level
OCTAVE
CobiT
delayed
exposure
34. Type of audit that checks information classification and change control procedures
vulnerability
mappers
single loss expectancy
administrative
35. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
CobiT
mappers
threat
planning horizon
36. Collection of controls an organization must have in place
ISO 17799
physical
security program
availability
37. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
ISO/IEC 27001
ISO 17799
availability
data owner
38. Daily goals focused on productivity and task-oriented activities
FMEA
operational
delayed
ISO 17799
39. An open language from mitre.org for determining vulnerabilities and problems on computer systems
firewall
OVAL
performance monitor
CISO
40. Potential danger to information or systems
Facilitated Risk Analysis Process
usage
vulnerability
threat
41. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
performance monitor
data owner
ISO/IEC 27002
vulnerability scanner
42. Information security managment measurements
ISO/IEC 27004
vulnerability
Information Security Management
chief information security officer
43. Ensures reliable timely access to data/resources to authorized individuals
usage
availability
exposure
SP 800-30
44. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
ISO 17799
FMEA
vulnerability
ISO 17799
45. The following tools (Nessus - Qualys - Retina) are ______________ scanners
risk analysis
security officer
vulnerability
privilege
46. Provides a cost/benefit comparision
ISO 17799
mappers
risk analysis
SP 800-30
47. The asset's value multiplied by the EF percentage - (SLE)
fault tree analysis
single loss expectancy
ISO 17799
availability
48. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
ISO/IEC 27799
network mapping
john the ripper
security program
49. Percentage of an asset's value that would be lost in a single incident - (EF)
usage
security program
Information risk management
exposure factor
50. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
fault tree analysis
FMEA
ISO/IEC 27005
physical