SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
countermeasure
exposure
network mapping
john the ripper
2. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
security officer
security program
COSO
ISO 17799
3. Collection of controls an organization must have in place
AS/NZS 4360
security program
countermeasure
due care
4. NIST risk management methodology
ISO 17799
security program
operational
SP 800-30
5. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
AS/NZS 4360
ISO/IEC 27004
risk catagories
protocol analyzer
6. Expected or predetermined performance level - developed from policy - performance - requirements
corporate security officer
ISO/IEC 27002
performance baseline
CobiT
7. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
availability
qualitative
OCTAVE
ISO/IEC 27001
8. __________ loss has a negative effect after a vulnerability is initially exploited
delayed
confidentiality
due care
risk anlysis
9. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
L0phtCrack
due care
performance monitor
annualized rate of occurrence
10. Corporate governance at the strategic level
Facilitated Risk Analysis Process
ISO 17799
risk mitigation
COSO
11. Focus on service level agreements between IT dept and internal customers
risk
fault tree analysis
availability
ITIL
12. SLE x ARO - (ALE)
ISO/IEC 27002
qualitative
annualized loss expectancy
strategic
13. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
ISO 17799
security governanace
COSO
countermeasure
14. Controls that implement access control - password mangement - identification and authentication methods - configuration
CISO
performance baseline
ISO 17799
technical
15. COSO
Information Technology Infrastructure Library (ITIL)
corporate security officer
Committee of Sponsoring Organizations
integrity
16. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
CobiT
ITIL
security officer
performance baseline
17. CSO
ISO/IEC 27001
risk catagories
exposure
corporate security officer
18. Potential danger to information or systems
annualized rate of occurrence
ISO 17799
threat
Failure Modes and Effect Analysis
19. Type of audit that checks that accounts - groups and roles are correctly assigned
privilege
technical
planning horizon
network mapping
20. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
FMEA
qualitative
availability
planning horizon
21. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
vulnerability
mappers
technical
annualized loss expectancy
22. Mitigates a potential risk
CobiT
countermeasure
firewall
administrative
23. De facto standard of best practices for IT service mgmt
CISO
Information Technology Infrastructure Library (ITIL)
annualized rate of occurrence
annualized loss expectancy
24. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
ISO 17799
CobiT
FMEA
privilege
25. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
due care
FRAP
john the ripper
Control Objectives for Information and related Technology
26. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
ISO/IEC 27001
due care
IRM
ISO/IEC 27002
27. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
COSO
integrity
annualized rate of occurrence
tactical
28. Strategic - tactical and operational planning
L0phtCrack
Failure Modes and Effect Analysis
security governanace
planning horizon
29. Guide assist in the implemenation of information security based on risk managent approach
ISO/IEC 27005
confidentiality
ISO/IEC 27799
annualized loss expectancy
30. Tools to ID - develop - and design security requirements for business needs
security officer
blueprints
network mapping
COSO
31. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
administrative
ISO/IEC 27002
countermeasure
COSO
32. Information security managment measurements
firewall
risk analysis
integrity
ISO/IEC 27004
33. Type of audit that checks that network resources - systems and software are used appropriately
administrative
OCTAVE
exposure factor
usage
34. An instance of being exposed to losses from a threat
IRM
risk analysis
exposure
OVAL
35. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
CobiT
Facilitated Risk Analysis Process
security governanace
ISO/IEC 27005
36. Type of audit that checks procedures and policies for escalating issues to management
ISO 17799
threat
annualized rate of occurrence
escalation
37. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
risk
FMEA
vulnerability scanner
single loss expectancy
38. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
Operationally Critical Threat - Asset - and Vulnerability Evaluation
ISO 17799
threat
FMEA
39. FMEA
single loss expectancy
ISO/IEC 27004
vulnerability
Failure Modes and Effect Analysis
40. Made up of ten domains - a mechanism to describe security processes
L0phtCrack
administrative
ISO 17799
risk
41. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
network mapping
performance baseline
qualitative
threat
42. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
performance monitor
risk catagories
BS7799
risk anlysis
43. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
annualized loss expectancy
risk mitigation
COSO
security governanace
44. The following tools (Nessus - Qualys - Retina) are ______________ scanners
threat
usage
Information Technology Infrastructure Library (ITIL)
vulnerability
45. Possiblity of damage and the ramifications should it occur
elcomsoft
risk
BS7799
OVAL
46. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
Facilitated Risk Analysis Process
operational
ISO/IEC 27002
security program
47. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
CISO
exposure factor
risk
integrity
48. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
ISO/IEC 27002
Information Security Management
single loss expectancy
ISO/IEC 27799
49. Number of time the incident might occur annually - (ARO)
annualized rate of occurrence
COSO
COSO
network mapping
50. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
OCTAVE
due care
risk
administrative