SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
delayed
network mapping
network mapping
CISO
2. Guide assist in the implemenation of information security based on risk managent approach
ISO/IEC 27005
port scanner
john the ripper
Information risk management
3. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
integrity
IRM
chief information security officer
FMEA
4. Corporate governance at the strategic level
risk anlysis
CobiT
COSO
CobiT
5. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
L0phtCrack
mappers
usage
ISO 17799
6. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
security program
performance monitor
AS/NZS 4360
ISO 17799
7. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
network mapping
vulnerability
risk catagories
CobiT
8. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
elcomsoft
vulnerability scanner
integrity
administrative
9. The asset's value multiplied by the EF percentage - (SLE)
network mapping
risk anlysis
exposure factor
single loss expectancy
10. Number of time the incident might occur annually - (ARO)
ISO/IEC 27004
OVAL
risk catagories
annualized rate of occurrence
11. Percentage of an asset's value that would be lost in a single incident - (EF)
Control Objectives for Information and related Technology
AS/NZS 4360
threat
exposure factor
12. Collection of controls an organization must have in place
security program
Information risk management
privilege
operational
13. FMEA
risk analysis
administrative
Failure Modes and Effect Analysis
SP 800-30
14. Type of audit that checks procedures and policies for escalating issues to management
vulnerability
availability
escalation
john the ripper
15. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
security officer
risk mitigation
exposure
port scanner
16. Focus on service level agreements between IT dept and internal customers
ISO 17799
protocol analyzer
SP 800-30
ITIL
17. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
BS7799
Committee of Sponsoring Organizations
network mapping
AS/NZS 4360
18. CobiT
Information Technology Infrastructure Library (ITIL)
Control Objectives for Information and related Technology
risk mitigation
availability
19. Potential danger to information or systems
threat
FMEA
ISO/IEC 27001
CISO
20. CISO
network mapping
administrative
AS/NZS 4360
chief information security officer
21. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
COSO
ITIL
BS7799
FRAP
22. SLE x ARO - (ALE)
port scanner
BS7799
annualized loss expectancy
Information Security Management
23. Made up of ten domains - a mechanism to describe security processes
Information risk management
strategic
Information Technology Infrastructure Library (ITIL)
ISO 17799
24. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
Committee of Sponsoring Organizations
risk anlysis
firewall
network mapping
25. A weakness (software - hardware - procedural - human) that can be exploited
network mapping
escalation
risk analysis
vulnerability
26. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
risk
mappers
Failure Modes and Effect Analysis
BS7799
27. An instance of being exposed to losses from a threat
CobiT
annualized rate of occurrence
network mapping
exposure
28. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
annualized rate of occurrence
vulnerability
exposure
due care
29. Used to ID failures in a complex systems to understand underlying causes of threats
SP 800-30
Facilitated Risk Analysis Process
operational
fault tree analysis
30. The following tools (Nessus - Qualys - Retina) are ______________ scanners
countermeasure
ISO/IEC 27005
vulnerability
integrity
31. FRAP
risk analysis
CobiT
firewall
Facilitated Risk Analysis Process
32. NIST risk management methodology
annualized rate of occurrence
SP 800-30
qualitative
planning horizon
33. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
single loss expectancy
vulnerability scanner
exposure factor
protocol analyzer
34. De facto standard of best practices for IT service mgmt
administrative
Operationally Critical Threat - Asset - and Vulnerability Evaluation
elcomsoft
Information Technology Infrastructure Library (ITIL)
35. CSO
ISO 17799
port scanner
corporate security officer
network mapping
36. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
penetration
ITIL
privilege
FRAP
37. Ensures necessary level of secrecy and prevents unauthorized disclosure
physical
confidentiality
vulnerability
FMEA
38. A log that can record outgoing requests - incoming traffic - and internet usage
vulnerability
firewall
escalation
security officer
39. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
availability
risk
IRM
escalation
40. Controls that implement access control - password mangement - identification and authentication methods - configuration
ISO/IEC 27002
usage
technical
CobiT
41. The tools - personnel and business processes necessary to ensure that security meets needs
strategic
CobiT
annualized rate of occurrence
security governanace
42. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
physical
vulnerability
countermeasure
ISO/IEC 27002
43. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
L0phtCrack
OCTAVE
IRM
ISO/IEC 27002
44. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
Information Security Management
administrative
Control Objectives for Information and related Technology
FMEA
45. IRM
CobiT
single loss expectancy
Information risk management
Control Objectives for Information and related Technology
46. Type of audit that checks information classification and change control procedures
technical
administrative
strategic
Information Technology Infrastructure Library (ITIL)
47. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
performance baseline
port scanner
CobiT
protocol analyzer
48. Daily goals focused on productivity and task-oriented activities
availability
corporate security officer
delayed
operational
49. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
vulnerability scanner
performance baseline
protocol analyzer
Committee of Sponsoring Organizations
50. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
No events - Errors only - Errors and warnings - All events
performance monitor
penetration
risk anlysis