SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ISM Standard
ISO/IEC 27799
CobiT
operational
Information Security Management
2. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
risk analysis
IRM
vulnerability scanner
penetration
3. FRAP
COSO
operational
due care
Facilitated Risk Analysis Process
4. Responsible for information classification and protection
firewall
CISO
mappers
data owner
5. The following tools (Nessus - Qualys - Retina) are ______________ scanners
OCTAVE
L0phtCrack
vulnerability
administrative
6. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
physical
L0phtCrack
strategic
risk catagories
7. The likelihood of exploitation and the loss potential
security officer
COSO
threat
risk
8. Daily goals focused on productivity and task-oriented activities
FMEA
CISO
Committee of Sponsoring Organizations
operational
9. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
corporate security officer
COSO
escalation
operational
10. FMEA
confidentiality
security officer
Failure Modes and Effect Analysis
ISO/IEC 27004
11. Derived from the COSO framework
risk analysis
availability
firewall
CobiT
12. Ensures reliable timely access to data/resources to authorized individuals
availability
integrity
exposure factor
fault tree analysis
13. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
protocol analyzer
Information risk management
ITIL
risk analysis
14. Guide to illustrate how to protect personal health information
risk mitigation
ISO/IEC 27799
network mapping
physical
15. A log that can record outgoing requests - incoming traffic - and internet usage
vulnerability
due care
protocol analyzer
firewall
16. Assurance of accurancy and reliability of information and systems
CISO
integrity
risk analysis
confidentiality
17. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
FRAP
elcomsoft
CobiT
BS7799
18. Expected or predetermined performance level - developed from policy - performance - requirements
FRAP
CobiT
performance baseline
operational
19. IT governance at the operational level
countermeasure
john the ripper
CobiT
protocol analyzer
20. Guide assist in the implemenation of information security based on risk managent approach
network mapping
fault tree analysis
ISO 17799
ISO/IEC 27005
21. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
risk anlysis
countermeasure
AS/NZS 4360
port scanner
22. Type of audit that checks information classification and change control procedures
FMEA
administrative
Operationally Critical Threat - Asset - and Vulnerability Evaluation
strategic
23. Number of time the incident might occur annually - (ARO)
annualized rate of occurrence
data owner
performance monitor
vulnerability
24. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
vulnerability
port scanner
firewall
CobiT
25. Ensures managment security directives are fulfilled
security officer
vulnerability
OCTAVE
COSO
26. A weakness (software - hardware - procedural - human) that can be exploited
vulnerability
risk analysis
planning horizon
john the ripper
27. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
firewall
administrative
risk analysis
AS/NZS 4360
28. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
risk catagories
strategic
risk mitigation
usage
29. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
OCTAVE
OVAL
due care
tactical
30. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
administrative
SP 800-30
network mapping
chief information security officer
31. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
L0phtCrack
fault tree analysis
penetration
vulnerability scanner
32. Focus on service level agreements between IT dept and internal customers
CISO
ITIL
ISO/IEC 27799
vulnerability scanner
33. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
blueprints
security program
risk anlysis
ISO/IEC 27799
34. Tools to ID - develop - and design security requirements for business needs
blueprints
qualitative
penetration
due care
35. The tools - personnel and business processes necessary to ensure that security meets needs
port scanner
OCTAVE
security officer
security governanace
36. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
FMEA
availability
COSO
confidentiality
37. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
ISO/IEC 27001
physical
protocol analyzer
CobiT
38. Type of audit that checks that accounts - groups and roles are correctly assigned
network mapping
security program
penetration
privilege
39. De facto standard of best practices for IT service mgmt
Information Technology Infrastructure Library (ITIL)
delayed
blueprints
due care
40. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
delayed
threat
due care
mappers
41. CSO
single loss expectancy
L0phtCrack
corporate security officer
threat
42. An open language from mitre.org for determining vulnerabilities and problems on computer systems
No events - Errors only - Errors and warnings - All events
administrative
ISO/IEC 27005
OVAL
43. CISO
escalation
blueprints
network mapping
chief information security officer
44. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
risk
COSO
network mapping
annualized rate of occurrence
45. The asset's value multiplied by the EF percentage - (SLE)
vulnerability
single loss expectancy
penetration
CobiT
46. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
privilege
administrative
FRAP
fault tree analysis
47. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
risk mitigation
ISO 17799
risk analysis
strategic
48. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
performance monitor
ISO/IEC 27001
tactical
COSO
49. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
firewall
vulnerability scanner
COSO
risk mitigation
50. Ensures necessary level of secrecy and prevents unauthorized disclosure
vulnerability scanner
confidentiality
tactical
blueprints