SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
COSO
exposure factor
blueprints
confidentiality
2. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
risk analysis
vulnerability
annualized rate of occurrence
ISO/IEC 27002
3. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
CobiT
protocol analyzer
mappers
data owner
4. Corporate governance at the strategic level
risk
ISO/IEC 27799
security program
COSO
5. Assurance of accurancy and reliability of information and systems
operational
Information Security Management
integrity
physical
6. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
delayed
threat
vulnerability scanner
CobiT
7. Focus on service level agreements between IT dept and internal customers
ISO/IEC 27005
risk
ITIL
ISO 17799
8. CSO
ITIL
CobiT
corporate security officer
vulnerability
9. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
security governanace
firewall
network mapping
risk anlysis
10. IT governance at the operational level
usage
CobiT
vulnerability scanner
security program
11. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
penetration
countermeasure
administrative
ISO/IEC 27799
12. Expected or predetermined performance level - developed from policy - performance - requirements
Committee of Sponsoring Organizations
risk
performance baseline
ISO/IEC 27799
13. Tools to ID - develop - and design security requirements for business needs
annualized rate of occurrence
COSO
escalation
blueprints
14. Ensures necessary level of secrecy and prevents unauthorized disclosure
SP 800-30
ISO/IEC 27001
qualitative
confidentiality
15. Provides a cost/benefit comparision
performance monitor
strategic
Information Technology Infrastructure Library (ITIL)
risk analysis
16. The likelihood of exploitation and the loss potential
ISO/IEC 27799
risk
risk anlysis
corporate security officer
17. Potential danger to information or systems
vulnerability
mappers
threat
CISO
18. Event levels available for logging in a MS DNS server
Committee of Sponsoring Organizations
OVAL
No events - Errors only - Errors and warnings - All events
qualitative
19. Percentage of an asset's value that would be lost in a single incident - (EF)
annualized rate of occurrence
security program
exposure factor
risk anlysis
20. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
FMEA
ISO/IEC 27002
physical
L0phtCrack
21. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
AS/NZS 4360
CobiT
port scanner
operational
22. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
COSO
security program
protocol analyzer
CobiT
23. IRM
threat
Information risk management
integrity
fault tree analysis
24. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
physical
Control Objectives for Information and related Technology
security officer
FRAP
25. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
COSO
OCTAVE
physical
elcomsoft
26. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
technical
ISO 17799
threat
security program
27. ISM Standard
protocol analyzer
exposure
L0phtCrack
Information Security Management
28. Used to ID failures in a complex systems to understand underlying causes of threats
planning horizon
fault tree analysis
ISO/IEC 27002
elcomsoft
29. SLE x ARO - (ALE)
vulnerability scanner
integrity
FMEA
annualized loss expectancy
30. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
operational
port scanner
security officer
administrative
31. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
L0phtCrack
data owner
administrative
CISO
32. An instance of being exposed to losses from a threat
exposure
qualitative
ISO 17799
Control Objectives for Information and related Technology
33. Derived from the COSO framework
escalation
CobiT
operational
COSO
34. CISO
chief information security officer
Committee of Sponsoring Organizations
security governanace
ITIL
35. Made up of ten domains - a mechanism to describe security processes
risk
physical
Failure Modes and Effect Analysis
ISO 17799
36. Mitigates a potential risk
L0phtCrack
countermeasure
CobiT
vulnerability
37. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
OCTAVE
risk analysis
ISO/IEC 27799
elcomsoft
38. Ensures managment security directives are fulfilled
security officer
integrity
ISO/IEC 27001
network mapping
39. The following tools (Nessus - Qualys - Retina) are ______________ scanners
ITIL
vulnerability
john the ripper
administrative
40. Controls that implement access control - password mangement - identification and authentication methods - configuration
Facilitated Risk Analysis Process
vulnerability scanner
technical
COSO
41. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
mappers
john the ripper
performance monitor
CobiT
42. Risk mgmt method with much broader focus than IT security
planning horizon
vulnerability
AS/NZS 4360
performance monitor
43. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
blueprints
escalation
CobiT
strategic
44. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
usage
risk
due care
Facilitated Risk Analysis Process
45. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
CISO
escalation
operational
data owner
46. OCTAVE
security governanace
Operationally Critical Threat - Asset - and Vulnerability Evaluation
vulnerability
ISO/IEC 27002
47. Type of audit that checks that network resources - systems and software are used appropriately
risk analysis
Failure Modes and Effect Analysis
usage
countermeasure
48. Guide to illustrate how to protect personal health information
No events - Errors only - Errors and warnings - All events
operational
ISO/IEC 27799
chief information security officer
49. Collection of controls an organization must have in place
security program
annualized rate of occurrence
threat
usage
50. Midterm goals
tactical
Control Objectives for Information and related Technology
chief information security officer
performance monitor