SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Derived from the COSO framework
SP 800-30
CobiT
escalation
Information Security Management
2. Type of audit that checks that network resources - systems and software are used appropriately
usage
risk analysis
annualized rate of occurrence
threat
3. The tools - personnel and business processes necessary to ensure that security meets needs
security governanace
strategic
No events - Errors only - Errors and warnings - All events
vulnerability
4. An instance of being exposed to losses from a threat
IRM
operational
risk anlysis
exposure
5. Corporate governance at the strategic level
threat
COSO
risk catagories
Information Technology Infrastructure Library (ITIL)
6. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
Committee of Sponsoring Organizations
strategic
physical
Facilitated Risk Analysis Process
7. Provides a cost/benefit comparision
network mapping
technical
exposure factor
risk analysis
8. Possiblity of damage and the ramifications should it occur
Control Objectives for Information and related Technology
annualized loss expectancy
protocol analyzer
risk
9. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
chief information security officer
CobiT
administrative
vulnerability
10. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
IRM
COSO
network mapping
qualitative
11. SLE x ARO - (ALE)
Committee of Sponsoring Organizations
ISO/IEC 27002
annualized loss expectancy
security officer
12. Guide assist in the implemenation of information security based on risk managent approach
Information Technology Infrastructure Library (ITIL)
fault tree analysis
ISO/IEC 27005
availability
13. IRM
FRAP
Information risk management
ISO/IEC 27001
Committee of Sponsoring Organizations
14. Controls that implement access control - password mangement - identification and authentication methods - configuration
technical
IRM
planning horizon
protocol analyzer
15. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
CobiT
security governanace
L0phtCrack
vulnerability
16. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
mappers
CISO
risk
confidentiality
17. The likelihood of exploitation and the loss potential
usage
FMEA
single loss expectancy
risk
18. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
availability
usage
annualized loss expectancy
administrative
19. The following tools (Nessus - Qualys - Retina) are ______________ scanners
vulnerability scanner
vulnerability
ISO 17799
qualitative
20. The asset's value multiplied by the EF percentage - (SLE)
protocol analyzer
BS7799
single loss expectancy
ISO/IEC 27005
21. NIST risk management methodology
FMEA
single loss expectancy
SP 800-30
ISO 17799
22. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
risk catagories
escalation
annualized loss expectancy
vulnerability
23. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
ISO/IEC 27799
exposure factor
network mapping
COSO
24. FMEA
risk analysis
vulnerability
Failure Modes and Effect Analysis
threat
25. Ensures necessary level of secrecy and prevents unauthorized disclosure
security program
AS/NZS 4360
penetration
confidentiality
26. Event levels available for logging in a MS DNS server
SP 800-30
confidentiality
Information Security Management
No events - Errors only - Errors and warnings - All events
27. CobiT
tactical
mappers
Control Objectives for Information and related Technology
vulnerability
28. CISO
risk
risk
risk analysis
chief information security officer
29. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
vulnerability scanner
ISO 17799
security officer
ISO/IEC 27799
30. Percentage of an asset's value that would be lost in a single incident - (EF)
Facilitated Risk Analysis Process
performance monitor
exposure factor
security governanace
31. Risk mgmt method with much broader focus than IT security
AS/NZS 4360
network mapping
Facilitated Risk Analysis Process
CISO
32. Number of time the incident might occur annually - (ARO)
Facilitated Risk Analysis Process
annualized rate of occurrence
administrative
john the ripper
33. Responsible for information classification and protection
strategic
threat
data owner
OVAL
34. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
CobiT
threat
ISO 17799
IRM
35. An open language from mitre.org for determining vulnerabilities and problems on computer systems
chief information security officer
ITIL
OVAL
COSO
36. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
risk analysis
port scanner
ISO 17799
strategic
37. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
annualized loss expectancy
L0phtCrack
ISO/IEC 27001
protocol analyzer
38. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
qualitative
CobiT
risk mitigation
ISO/IEC 27001
39. Midterm goals
tactical
SP 800-30
Control Objectives for Information and related Technology
single loss expectancy
40. COSO
Committee of Sponsoring Organizations
mappers
data owner
vulnerability
41. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
CobiT
CISO
blueprints
ISO/IEC 27005
42. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
COSO
single loss expectancy
vulnerability
No events - Errors only - Errors and warnings - All events
43. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
security program
COSO
data owner
Committee of Sponsoring Organizations
44. Collection of controls an organization must have in place
security program
BS7799
protocol analyzer
annualized loss expectancy
45. __________ loss has a negative effect after a vulnerability is initially exploited
exposure factor
risk mitigation
delayed
AS/NZS 4360
46. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
physical
tactical
ISO/IEC 27002
ISO/IEC 27001
47. Mitigates a potential risk
risk
ISO/IEC 27001
countermeasure
risk catagories
48. A weakness (software - hardware - procedural - human) that can be exploited
vulnerability
planning horizon
SP 800-30
risk
49. Daily goals focused on productivity and task-oriented activities
operational
penetration
ISO 17799
usage
50. Made up of ten domains - a mechanism to describe security processes
escalation
ISO 17799
network mapping
vulnerability