SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Ensures necessary level of secrecy and prevents unauthorized disclosure
operational
confidentiality
performance monitor
strategic
2. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
security program
L0phtCrack
administrative
ISO 17799
3. Focus on service level agreements between IT dept and internal customers
administrative
COSO
ITIL
Failure Modes and Effect Analysis
4. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
tactical
security program
performance monitor
vulnerability
5. Corporate governance at the strategic level
COSO
Control Objectives for Information and related Technology
mappers
exposure
6. IT governance at the operational level
Facilitated Risk Analysis Process
elcomsoft
due care
CobiT
7. Expected or predetermined performance level - developed from policy - performance - requirements
strategic
performance baseline
Information risk management
blueprints
8. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
Operationally Critical Threat - Asset - and Vulnerability Evaluation
network mapping
due care
IRM
9. Possiblity of damage and the ramifications should it occur
risk
exposure factor
IRM
ISO 17799
10. IRM
Information risk management
CobiT
mappers
exposure factor
11. CobiT
qualitative
Control Objectives for Information and related Technology
CobiT
vulnerability
12. A log that can record outgoing requests - incoming traffic - and internet usage
COSO
vulnerability
firewall
risk
13. CISO
annualized rate of occurrence
administrative
risk catagories
chief information security officer
14. Collection of controls an organization must have in place
risk analysis
security program
qualitative
fault tree analysis
15. Potential danger to information or systems
threat
blueprints
integrity
CobiT
16. Made up of ten domains - a mechanism to describe security processes
technical
ISO 17799
FRAP
Information risk management
17. Derived from the COSO framework
john the ripper
risk analysis
risk
CobiT
18. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
COSO
CobiT
L0phtCrack
security program
19. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
Facilitated Risk Analysis Process
penetration
Control Objectives for Information and related Technology
physical
20. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
network mapping
countermeasure
CobiT
No events - Errors only - Errors and warnings - All events
21. Guide assist in the implemenation of information security based on risk managent approach
risk analysis
ISO/IEC 27005
exposure factor
port scanner
22. Type of audit that checks that accounts - groups and roles are correctly assigned
privilege
firewall
escalation
COSO
23. ISM Standard
planning horizon
corporate security officer
FRAP
Information Security Management
24. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
security governanace
Failure Modes and Effect Analysis
delayed
FMEA
25. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
annualized rate of occurrence
ISO 17799
COSO
ISO/IEC 27799
26. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
OCTAVE
due care
usage
security program
27. The asset's value multiplied by the EF percentage - (SLE)
privilege
FMEA
vulnerability scanner
single loss expectancy
28. Controls that implement access control - password mangement - identification and authentication methods - configuration
escalation
countermeasure
technical
risk analysis
29. Provides a cost/benefit comparision
threat
risk mitigation
risk analysis
COSO
30. FMEA
Committee of Sponsoring Organizations
vulnerability
network mapping
Failure Modes and Effect Analysis
31. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
availability
performance monitor
protocol analyzer
COSO
32. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
vulnerability scanner
vulnerability
vulnerability
firewall
33. FRAP
physical
Facilitated Risk Analysis Process
CobiT
penetration
34. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
network mapping
security program
SP 800-30
privilege
35. Type of audit that checks information classification and change control procedures
administrative
countermeasure
FMEA
port scanner
36. Risk mgmt method with much broader focus than IT security
AS/NZS 4360
OVAL
ISO/IEC 27004
IRM
37. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
L0phtCrack
technical
physical
corporate security officer
38. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
risk analysis
threat
security officer
vulnerability
39. Responsible for information classification and protection
annualized rate of occurrence
ISO/IEC 27004
data owner
performance monitor
40. CSO
corporate security officer
vulnerability
FMEA
FMEA
41. The likelihood of exploitation and the loss potential
risk
OCTAVE
planning horizon
corporate security officer
42. A weakness (software - hardware - procedural - human) that can be exploited
BS7799
risk catagories
ISO 17799
vulnerability
43. Responsible for communicating to senior mgmt organizational risks and compliance regulations
annualized rate of occurrence
CISO
Facilitated Risk Analysis Process
Committee of Sponsoring Organizations
44. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
OVAL
ISO 17799
performance baseline
exposure factor
45. Information security managment measurements
performance baseline
OVAL
Facilitated Risk Analysis Process
ISO/IEC 27004
46. Event levels available for logging in a MS DNS server
CISO
integrity
risk
No events - Errors only - Errors and warnings - All events
47. De facto standard of best practices for IT service mgmt
strategic
usage
Information Technology Infrastructure Library (ITIL)
COSO
48. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
administrative
firewall
vulnerability
risk analysis
49. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
CISO
availability
FMEA
BS7799
50. Assurance of accurancy and reliability of information and systems
integrity
availability
FRAP
vulnerability