SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. De facto standard of best practices for IT service mgmt
Information Technology Infrastructure Library (ITIL)
CobiT
security officer
qualitative
2. Ensures managment security directives are fulfilled
risk anlysis
security officer
risk
blueprints
3. Controls that implement access control - password mangement - identification and authentication methods - configuration
single loss expectancy
technical
risk
ISO 17799
4. Ensures necessary level of secrecy and prevents unauthorized disclosure
CISO
confidentiality
qualitative
COSO
5. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
due care
security program
elcomsoft
availability
6. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
CobiT
FRAP
network mapping
fault tree analysis
7. Risk mgmt method with much broader focus than IT security
ISO/IEC 27799
AS/NZS 4360
penetration
Information Technology Infrastructure Library (ITIL)
8. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
OCTAVE
vulnerability
ISO 17799
chief information security officer
9. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
technical
qualitative
risk anlysis
security program
10. Used to ID failures in a complex systems to understand underlying causes of threats
fault tree analysis
Control Objectives for Information and related Technology
vulnerability
FRAP
11. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
risk analysis
tactical
COSO
confidentiality
12. SLE x ARO - (ALE)
vulnerability scanner
Control Objectives for Information and related Technology
annualized loss expectancy
risk catagories
13. Responsible for information classification and protection
data owner
Information risk management
FRAP
OVAL
14. Responsible for communicating to senior mgmt organizational risks and compliance regulations
port scanner
qualitative
CISO
tactical
15. Percentage of an asset's value that would be lost in a single incident - (EF)
Information Security Management
exposure factor
port scanner
ISO/IEC 27004
16. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
annualized rate of occurrence
FMEA
Facilitated Risk Analysis Process
COSO
17. Type of audit that checks procedures and policies for escalating issues to management
escalation
countermeasure
vulnerability
ISO/IEC 27799
18. The asset's value multiplied by the EF percentage - (SLE)
john the ripper
single loss expectancy
network mapping
tactical
19. COSO
data owner
mappers
Committee of Sponsoring Organizations
corporate security officer
20. A log that can record outgoing requests - incoming traffic - and internet usage
network mapping
qualitative
Failure Modes and Effect Analysis
firewall
21. Derived from the COSO framework
CobiT
IRM
OVAL
integrity
22. Collection of controls an organization must have in place
security program
strategic
blueprints
CISO
23. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
data owner
ISO 17799
penetration
risk mitigation
24. The tools - personnel and business processes necessary to ensure that security meets needs
physical
Control Objectives for Information and related Technology
security governanace
fault tree analysis
25. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
CobiT
port scanner
due care
FRAP
26. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
CobiT
strategic
network mapping
single loss expectancy
27. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
performance monitor
OCTAVE
technical
physical
28. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
OCTAVE
network mapping
countermeasure
tactical
29. Ensures reliable timely access to data/resources to authorized individuals
firewall
security officer
availability
performance monitor
30. The following tools (Nessus - Qualys - Retina) are ______________ scanners
ISO 17799
planning horizon
due care
vulnerability
31. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
mappers
security program
strategic
Failure Modes and Effect Analysis
32. The likelihood of exploitation and the loss potential
risk anlysis
integrity
protocol analyzer
risk
33. Number of time the incident might occur annually - (ARO)
integrity
security officer
annualized rate of occurrence
risk analysis
34. Type of audit that checks information classification and change control procedures
CISO
Operationally Critical Threat - Asset - and Vulnerability Evaluation
CobiT
administrative
35. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
Information Security Management
performance baseline
vulnerability scanner
escalation
36. __________ loss has a negative effect after a vulnerability is initially exploited
CISO
IRM
Failure Modes and Effect Analysis
delayed
37. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
COSO
FMEA
protocol analyzer
exposure
38. CISO
risk analysis
chief information security officer
elcomsoft
escalation
39. Guide assist in the implemenation of information security based on risk managent approach
IRM
vulnerability
escalation
ISO/IEC 27005
40. FRAP
ISO 17799
No events - Errors only - Errors and warnings - All events
Facilitated Risk Analysis Process
security program
41. A weakness (software - hardware - procedural - human) that can be exploited
performance monitor
vulnerability
SP 800-30
ISO/IEC 27002
42. Type of audit that checks that accounts - groups and roles are correctly assigned
physical
privilege
network mapping
exposure
43. OCTAVE
Operationally Critical Threat - Asset - and Vulnerability Evaluation
exposure factor
chief information security officer
Information Technology Infrastructure Library (ITIL)
44. Mitigates a potential risk
blueprints
Committee of Sponsoring Organizations
countermeasure
tactical
45. An open language from mitre.org for determining vulnerabilities and problems on computer systems
security program
ISO 17799
strategic
OVAL
46. Strategic - tactical and operational planning
BS7799
No events - Errors only - Errors and warnings - All events
planning horizon
administrative
47. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
Control Objectives for Information and related Technology
L0phtCrack
OVAL
COSO
48. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
security program
ISO 17799
protocol analyzer
operational
49. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
performance monitor
OVAL
vulnerability
risk mitigation
50. Type of audit that checks that network resources - systems and software are used appropriately
administrative
ISO 17799
usage
ISO 17799