SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Daily goals focused on productivity and task-oriented activities
operational
annualized loss expectancy
corporate security officer
security governanace
2. The likelihood of exploitation and the loss potential
exposure factor
risk
data owner
OVAL
3. Midterm goals
COSO
administrative
tactical
network mapping
4. SLE x ARO - (ALE)
mappers
fault tree analysis
annualized loss expectancy
security program
5. OCTAVE
exposure factor
exposure
ISO/IEC 27001
Operationally Critical Threat - Asset - and Vulnerability Evaluation
6. De facto standard of best practices for IT service mgmt
Information Technology Infrastructure Library (ITIL)
confidentiality
IRM
CISO
7. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
mappers
physical
risk mitigation
threat
8. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
operational
privilege
Control Objectives for Information and related Technology
FMEA
9. Focus on service level agreements between IT dept and internal customers
countermeasure
mappers
CobiT
ITIL
10. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
Control Objectives for Information and related Technology
network mapping
L0phtCrack
countermeasure
11. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
ISO/IEC 27001
planning horizon
security program
performance monitor
12. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
No events - Errors only - Errors and warnings - All events
fault tree analysis
administrative
risk catagories
13. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
FMEA
due care
Committee of Sponsoring Organizations
Control Objectives for Information and related Technology
14. Responsible for information classification and protection
risk mitigation
countermeasure
chief information security officer
data owner
15. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
risk analysis
port scanner
performance monitor
threat
16. FMEA
ISO 17799
planning horizon
Failure Modes and Effect Analysis
network mapping
17. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
security governanace
exposure
elcomsoft
risk catagories
18. Event levels available for logging in a MS DNS server
No events - Errors only - Errors and warnings - All events
availability
COSO
CISO
19. Strategic - tactical and operational planning
risk
planning horizon
COSO
CobiT
20. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
port scanner
Failure Modes and Effect Analysis
ISO 17799
integrity
21. CSO
ISO/IEC 27005
corporate security officer
ISO 17799
CobiT
22. Guide to illustrate how to protect personal health information
network mapping
tactical
L0phtCrack
ISO/IEC 27799
23. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
strategic
Committee of Sponsoring Organizations
confidentiality
FMEA
24. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
BS7799
ISO/IEC 27001
FMEA
vulnerability
25. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
network mapping
john the ripper
SP 800-30
tactical
26. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
CISO
COSO
Facilitated Risk Analysis Process
administrative
27. A log that can record outgoing requests - incoming traffic - and internet usage
firewall
elcomsoft
operational
Control Objectives for Information and related Technology
28. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
strategic
SP 800-30
CobiT
ISO/IEC 27005
29. IRM
FMEA
john the ripper
Information risk management
security program
30. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
vulnerability scanner
risk analysis
port scanner
CobiT
31. Ensures reliable timely access to data/resources to authorized individuals
ISO/IEC 27005
Facilitated Risk Analysis Process
Information Technology Infrastructure Library (ITIL)
availability
32. Ensures managment security directives are fulfilled
ITIL
security officer
Failure Modes and Effect Analysis
Information Security Management
33. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
security program
ISO/IEC 27002
ISO/IEC 27005
BS7799
34. Assurance of accurancy and reliability of information and systems
exposure factor
due care
performance monitor
integrity
35. The tools - personnel and business processes necessary to ensure that security meets needs
security governanace
vulnerability scanner
network mapping
Control Objectives for Information and related Technology
36. Type of audit that checks that network resources - systems and software are used appropriately
fault tree analysis
ISO/IEC 27004
usage
COSO
37. The asset's value multiplied by the EF percentage - (SLE)
COSO
CISO
single loss expectancy
delayed
38. Controls that implement access control - password mangement - identification and authentication methods - configuration
OVAL
technical
countermeasure
SP 800-30
39. Used to ID failures in a complex systems to understand underlying causes of threats
administrative
fault tree analysis
OVAL
network mapping
40. Type of audit that checks procedures and policies for escalating issues to management
ISO/IEC 27004
tactical
escalation
availability
41. A weakness (software - hardware - procedural - human) that can be exploited
blueprints
COSO
vulnerability
risk
42. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
technical
performance monitor
Information Technology Infrastructure Library (ITIL)
L0phtCrack
43. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
CISO
L0phtCrack
OCTAVE
risk
44. An open language from mitre.org for determining vulnerabilities and problems on computer systems
OVAL
exposure
Control Objectives for Information and related Technology
risk analysis
45. Potential danger to information or systems
risk anlysis
threat
vulnerability scanner
FRAP
46. Responsible for communicating to senior mgmt organizational risks and compliance regulations
chief information security officer
risk mitigation
usage
CISO
47. Possiblity of damage and the ramifications should it occur
security program
performance baseline
john the ripper
risk
48. FRAP
Information Security Management
Facilitated Risk Analysis Process
security program
CobiT
49. Derived from the COSO framework
FMEA
ITIL
elcomsoft
CobiT
50. Collection of controls an organization must have in place
security program
IRM
blueprints
administrative