SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
ISO 17799
technical
CobiT
FMEA
2. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
ISO/IEC 27002
threat
security officer
vulnerability
3. Guide to illustrate how to protect personal health information
Information risk management
risk analysis
chief information security officer
ISO/IEC 27799
4. Percentage of an asset's value that would be lost in a single incident - (EF)
chief information security officer
ISO/IEC 27004
exposure factor
technical
5. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
IRM
security program
network mapping
FMEA
6. FRAP
Facilitated Risk Analysis Process
Committee of Sponsoring Organizations
vulnerability scanner
exposure factor
7. NIST risk management methodology
SP 800-30
risk analysis
single loss expectancy
BS7799
8. Guide assist in the implemenation of information security based on risk managent approach
ISO/IEC 27004
ISO/IEC 27005
single loss expectancy
port scanner
9. OCTAVE
Operationally Critical Threat - Asset - and Vulnerability Evaluation
john the ripper
ISO/IEC 27001
vulnerability
10. Focus on service level agreements between IT dept and internal customers
ITIL
CobiT
CISO
risk
11. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
penetration
OCTAVE
risk analysis
elcomsoft
12. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
network mapping
tactical
FMEA
vulnerability
13. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
CobiT
risk analysis
Information Security Management
security governanace
14. Type of audit that checks that accounts - groups and roles are correctly assigned
Facilitated Risk Analysis Process
privilege
network mapping
operational
15. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
administrative
availability
ISO 17799
Failure Modes and Effect Analysis
16. Assurance of accurancy and reliability of information and systems
CobiT
network mapping
protocol analyzer
integrity
17. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
privilege
strategic
risk analysis
ISO 17799
18. Provides a cost/benefit comparision
strategic
FMEA
chief information security officer
risk analysis
19. Tools to ID - develop - and design security requirements for business needs
security officer
blueprints
Committee of Sponsoring Organizations
CobiT
20. Ensures reliable timely access to data/resources to authorized individuals
L0phtCrack
availability
single loss expectancy
Committee of Sponsoring Organizations
21. Type of audit that checks information classification and change control procedures
OCTAVE
administrative
usage
Information Security Management
22. IRM
ISO 17799
vulnerability
firewall
Information risk management
23. Mitigates a potential risk
countermeasure
COSO
security program
strategic
24. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
port scanner
L0phtCrack
physical
ISO/IEC 27799
25. Type of audit that checks that network resources - systems and software are used appropriately
IRM
usage
Facilitated Risk Analysis Process
ISO/IEC 27004
26. The likelihood of exploitation and the loss potential
risk
Control Objectives for Information and related Technology
vulnerability
chief information security officer
27. Ensures necessary level of secrecy and prevents unauthorized disclosure
OVAL
confidentiality
L0phtCrack
corporate security officer
28. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
Information risk management
corporate security officer
FMEA
risk catagories
29. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
due care
threat
CISO
blueprints
30. Daily goals focused on productivity and task-oriented activities
security governanace
risk
confidentiality
operational
31. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
port scanner
COSO
ISO/IEC 27002
FRAP
32. Responsible for information classification and protection
OVAL
tactical
data owner
FMEA
33. The asset's value multiplied by the EF percentage - (SLE)
Committee of Sponsoring Organizations
risk anlysis
single loss expectancy
threat
34. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
Control Objectives for Information and related Technology
OCTAVE
AS/NZS 4360
risk catagories
35. Controls that implement access control - password mangement - identification and authentication methods - configuration
Failure Modes and Effect Analysis
technical
FMEA
ISO/IEC 27799
36. COSO
Committee of Sponsoring Organizations
L0phtCrack
ISO/IEC 27799
CobiT
37. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
risk
COSO
penetration
security officer
38. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
Information Security Management
vulnerability
chief information security officer
FRAP
39. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
risk anlysis
escalation
vulnerability
ISO/IEC 27002
40. SLE x ARO - (ALE)
annualized loss expectancy
qualitative
elcomsoft
BS7799
41. Corporate governance at the strategic level
ISO 17799
COSO
qualitative
risk
42. Possiblity of damage and the ramifications should it occur
elcomsoft
performance baseline
risk
IRM
43. Strategic - tactical and operational planning
planning horizon
availability
annualized loss expectancy
blueprints
44. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
operational
protocol analyzer
availability
L0phtCrack
45. __________ loss has a negative effect after a vulnerability is initially exploited
security officer
qualitative
risk
delayed
46. Derived from the COSO framework
chief information security officer
Control Objectives for Information and related Technology
due care
CobiT
47. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
protocol analyzer
network mapping
confidentiality
mappers
48. Number of time the incident might occur annually - (ARO)
physical
integrity
annualized rate of occurrence
SP 800-30
49. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
risk
vulnerability scanner
OCTAVE
security program
50. Expected or predetermined performance level - developed from policy - performance - requirements
john the ripper
performance baseline
OVAL
strategic