SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
FMEA
IRM
COSO
ISO/IEC 27799
2. The likelihood of exploitation and the loss potential
risk
No events - Errors only - Errors and warnings - All events
single loss expectancy
AS/NZS 4360
3. SLE x ARO - (ALE)
ITIL
annualized loss expectancy
AS/NZS 4360
risk mitigation
4. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
performance monitor
qualitative
ISO/IEC 27002
BS7799
5. Responsible for information classification and protection
Information risk management
administrative
data owner
network mapping
6. Event levels available for logging in a MS DNS server
escalation
risk mitigation
No events - Errors only - Errors and warnings - All events
risk analysis
7. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
OCTAVE
ISO 17799
planning horizon
annualized rate of occurrence
8. The asset's value multiplied by the EF percentage - (SLE)
single loss expectancy
countermeasure
physical
risk anlysis
9. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
risk catagories
administrative
fault tree analysis
performance monitor
10. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
security program
escalation
ISO/IEC 27001
qualitative
11. De facto standard of best practices for IT service mgmt
data owner
Facilitated Risk Analysis Process
Failure Modes and Effect Analysis
Information Technology Infrastructure Library (ITIL)
12. Ensures managment security directives are fulfilled
exposure factor
risk mitigation
risk catagories
security officer
13. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
Committee of Sponsoring Organizations
ISO/IEC 27002
SP 800-30
qualitative
14. CobiT
Control Objectives for Information and related Technology
ITIL
planning horizon
technical
15. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
L0phtCrack
security program
delayed
vulnerability
16. OCTAVE
vulnerability
Operationally Critical Threat - Asset - and Vulnerability Evaluation
planning horizon
Failure Modes and Effect Analysis
17. Daily goals focused on productivity and task-oriented activities
operational
administrative
CobiT
single loss expectancy
18. The following tools (Nessus - Qualys - Retina) are ______________ scanners
vulnerability
escalation
ISO/IEC 27004
vulnerability scanner
19. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
network mapping
physical
Committee of Sponsoring Organizations
countermeasure
20. Type of audit that checks procedures and policies for escalating issues to management
escalation
CISO
BS7799
L0phtCrack
21. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
risk
qualitative
privilege
CobiT
22. Percentage of an asset's value that would be lost in a single incident - (EF)
exposure factor
delayed
performance baseline
IRM
23. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
strategic
physical
No events - Errors only - Errors and warnings - All events
ITIL
24. Mitigates a potential risk
exposure factor
security program
countermeasure
firewall
25. FMEA
security governanace
BS7799
vulnerability
Failure Modes and Effect Analysis
26. A log that can record outgoing requests - incoming traffic - and internet usage
security officer
Information risk management
administrative
firewall
27. IT governance at the operational level
annualized loss expectancy
CobiT
blueprints
risk
28. CSO
integrity
corporate security officer
risk
performance baseline
29. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
mappers
risk
due care
exposure factor
30. Guide assist in the implemenation of information security based on risk managent approach
chief information security officer
performance baseline
ISO/IEC 27005
ISO/IEC 27004
31. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
risk catagories
Failure Modes and Effect Analysis
Facilitated Risk Analysis Process
ISO/IEC 27002
32. Tools to ID - develop - and design security requirements for business needs
administrative
BS7799
Committee of Sponsoring Organizations
blueprints
33. A weakness (software - hardware - procedural - human) that can be exploited
CobiT
BS7799
vulnerability
COSO
34. An instance of being exposed to losses from a threat
physical
exposure
protocol analyzer
blueprints
35. Ensures reliable timely access to data/resources to authorized individuals
availability
risk anlysis
john the ripper
security officer
36. Ensures necessary level of secrecy and prevents unauthorized disclosure
confidentiality
risk catagories
single loss expectancy
AS/NZS 4360
37. Risk mgmt method with much broader focus than IT security
AS/NZS 4360
vulnerability scanner
strategic
ITIL
38. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
protocol analyzer
tactical
ISO/IEC 27001
AS/NZS 4360
39. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
ISO/IEC 27001
Control Objectives for Information and related Technology
L0phtCrack
usage
40. Derived from the COSO framework
risk anlysis
L0phtCrack
OCTAVE
CobiT
41. ISM Standard
Information Security Management
CobiT
Information Technology Infrastructure Library (ITIL)
Facilitated Risk Analysis Process
42. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
CobiT
administrative
single loss expectancy
ISO/IEC 27001
43. Controls that implement access control - password mangement - identification and authentication methods - configuration
network mapping
corporate security officer
protocol analyzer
technical
44. Type of audit that checks that accounts - groups and roles are correctly assigned
COSO
OVAL
escalation
privilege
45. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
FMEA
network mapping
risk anlysis
risk catagories
46. Responsible for communicating to senior mgmt organizational risks and compliance regulations
CISO
ISO/IEC 27002
network mapping
Information Technology Infrastructure Library (ITIL)
47. Type of audit that checks that network resources - systems and software are used appropriately
physical
usage
annualized loss expectancy
ISO/IEC 27002
48. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
physical
administrative
COSO
Operationally Critical Threat - Asset - and Vulnerability Evaluation
49. FRAP
exposure factor
Facilitated Risk Analysis Process
CobiT
Failure Modes and Effect Analysis
50. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
ISO 17799
vulnerability scanner
threat
BS7799