SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Responsible for communicating to senior mgmt organizational risks and compliance regulations
administrative
SP 800-30
CISO
L0phtCrack
2. COSO
delayed
COSO
Committee of Sponsoring Organizations
CobiT
3. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
risk analysis
FMEA
IRM
mappers
4. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
FMEA
network mapping
OVAL
john the ripper
5. An instance of being exposed to losses from a threat
due care
fault tree analysis
exposure
countermeasure
6. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
strategic
integrity
CISO
IRM
7. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
risk analysis
exposure factor
security program
Control Objectives for Information and related Technology
8. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
usage
L0phtCrack
ISO/IEC 27002
COSO
9. Ensures reliable timely access to data/resources to authorized individuals
data owner
ISO/IEC 27002
No events - Errors only - Errors and warnings - All events
availability
10. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
Information Technology Infrastructure Library (ITIL)
network mapping
administrative
security governanace
11. Type of audit that checks information classification and change control procedures
ISO/IEC 27005
administrative
CobiT
ISO/IEC 27002
12. CISO
john the ripper
chief information security officer
IRM
SP 800-30
13. Made up of ten domains - a mechanism to describe security processes
Failure Modes and Effect Analysis
ISO 17799
security program
risk mitigation
14. The following tools (Nessus - Qualys - Retina) are ______________ scanners
due care
ITIL
COSO
vulnerability
15. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
administrative
penetration
Failure Modes and Effect Analysis
countermeasure
16. De facto standard of best practices for IT service mgmt
ISO/IEC 27001
technical
Information Technology Infrastructure Library (ITIL)
blueprints
17. Used to ID failures in a complex systems to understand underlying causes of threats
ISO/IEC 27002
Facilitated Risk Analysis Process
fault tree analysis
ISO/IEC 27799
18. ISM Standard
exposure factor
Information Security Management
security program
chief information security officer
19. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
fault tree analysis
CobiT
exposure factor
administrative
20. Assurance of accurancy and reliability of information and systems
Information Technology Infrastructure Library (ITIL)
integrity
CobiT
CISO
21. Tools to ID - develop - and design security requirements for business needs
fault tree analysis
blueprints
FMEA
risk analysis
22. Controls that implement access control - password mangement - identification and authentication methods - configuration
ISO 17799
technical
threat
Information Security Management
23. Type of audit that checks that accounts - groups and roles are correctly assigned
strategic
privilege
BS7799
performance monitor
24. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
Control Objectives for Information and related Technology
security program
tactical
network mapping
25. Ensures managment security directives are fulfilled
BS7799
security officer
performance monitor
Control Objectives for Information and related Technology
26. Event levels available for logging in a MS DNS server
integrity
network mapping
No events - Errors only - Errors and warnings - All events
fault tree analysis
27. Mitigates a potential risk
L0phtCrack
risk anlysis
countermeasure
ISO/IEC 27005
28. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
physical
COSO
security program
ISO 17799
29. Potential danger to information or systems
CobiT
risk analysis
blueprints
threat
30. Expected or predetermined performance level - developed from policy - performance - requirements
performance monitor
performance baseline
CobiT
tactical
31. SLE x ARO - (ALE)
annualized loss expectancy
OVAL
integrity
network mapping
32. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
Information Security Management
FMEA
single loss expectancy
COSO
33. IRM
physical
Information risk management
ITIL
countermeasure
34. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
COSO
data owner
technical
mappers
35. An open language from mitre.org for determining vulnerabilities and problems on computer systems
technical
exposure factor
OVAL
No events - Errors only - Errors and warnings - All events
36. Number of time the incident might occur annually - (ARO)
risk analysis
annualized rate of occurrence
network mapping
planning horizon
37. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
FMEA
COSO
annualized rate of occurrence
penetration
38. The tools - personnel and business processes necessary to ensure that security meets needs
john the ripper
security governanace
penetration
performance baseline
39. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
elcomsoft
BS7799
OVAL
ISO/IEC 27001
40. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
operational
ISO/IEC 27001
Facilitated Risk Analysis Process
penetration
41. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
No events - Errors only - Errors and warnings - All events
administrative
confidentiality
OCTAVE
42. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
COSO
integrity
protocol analyzer
CISO
43. __________ loss has a negative effect after a vulnerability is initially exploited
delayed
network mapping
ISO/IEC 27799
operational
44. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
john the ripper
risk
COSO
protocol analyzer
45. CSO
BS7799
corporate security officer
performance monitor
ISO/IEC 27002
46. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
ITIL
risk catagories
COSO
due care
47. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
performance monitor
vulnerability
vulnerability
corporate security officer
48. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
countermeasure
No events - Errors only - Errors and warnings - All events
vulnerability scanner
L0phtCrack
49. Strategic - tactical and operational planning
ISO 17799
penetration
due care
planning horizon
50. Provides a cost/benefit comparision
risk analysis
security program
chief information security officer
vulnerability