SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. __________ loss has a negative effect after a vulnerability is initially exploited
delayed
CobiT
performance baseline
fault tree analysis
2. Type of audit that checks that accounts - groups and roles are correctly assigned
privilege
vulnerability scanner
exposure factor
risk analysis
3. Type of audit that checks that network resources - systems and software are used appropriately
risk mitigation
CISO
usage
CISO
4. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
OCTAVE
planning horizon
john the ripper
countermeasure
5. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
ISO 17799
Failure Modes and Effect Analysis
risk analysis
chief information security officer
6. FRAP
elcomsoft
annualized rate of occurrence
Facilitated Risk Analysis Process
risk anlysis
7. IT governance at the operational level
administrative
qualitative
usage
CobiT
8. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
ISO/IEC 27001
due care
CobiT
risk analysis
9. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
risk
CobiT
annualized rate of occurrence
operational
10. Type of audit that checks procedures and policies for escalating issues to management
ISO/IEC 27799
elcomsoft
escalation
ISO/IEC 27002
11. Mitigates a potential risk
performance baseline
countermeasure
due care
vulnerability
12. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
risk
risk analysis
john the ripper
mappers
13. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
annualized rate of occurrence
mappers
COSO
BS7799
14. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
vulnerability
CobiT
FMEA
ISO/IEC 27005
15. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
blueprints
FMEA
risk
availability
16. OCTAVE
performance baseline
CISO
Operationally Critical Threat - Asset - and Vulnerability Evaluation
security officer
17. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
IRM
ISO 17799
ITIL
CISO
18. Focus on service level agreements between IT dept and internal customers
due care
technical
AS/NZS 4360
ITIL
19. Assurance of accurancy and reliability of information and systems
FMEA
integrity
security officer
No events - Errors only - Errors and warnings - All events
20. Possiblity of damage and the ramifications should it occur
network mapping
escalation
OVAL
risk
21. The following tools (Nessus - Qualys - Retina) are ______________ scanners
john the ripper
administrative
ISO/IEC 27001
vulnerability
22. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
exposure factor
AS/NZS 4360
penetration
risk anlysis
23. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
No events - Errors only - Errors and warnings - All events
vulnerability scanner
tactical
risk catagories
24. Responsible for information classification and protection
FMEA
Committee of Sponsoring Organizations
delayed
data owner
25. NIST risk management methodology
SP 800-30
operational
COSO
risk anlysis
26. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
privilege
administrative
ISO 17799
ITIL
27. CSO
risk analysis
CISO
corporate security officer
L0phtCrack
28. Guide to illustrate how to protect personal health information
ISO/IEC 27799
integrity
ISO/IEC 27004
exposure
29. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
OCTAVE
FMEA
privilege
CobiT
30. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
risk mitigation
strategic
ISO/IEC 27002
risk anlysis
31. Ensures managment security directives are fulfilled
COSO
countermeasure
performance baseline
security officer
32. CobiT
Control Objectives for Information and related Technology
OVAL
Information risk management
threat
33. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
risk anlysis
ITIL
privilege
Operationally Critical Threat - Asset - and Vulnerability Evaluation
34. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
CobiT
COSO
protocol analyzer
Failure Modes and Effect Analysis
35. Provides a cost/benefit comparision
countermeasure
performance monitor
COSO
risk analysis
36. SLE x ARO - (ALE)
Information Security Management
CobiT
Control Objectives for Information and related Technology
annualized loss expectancy
37. Percentage of an asset's value that would be lost in a single incident - (EF)
ISO 17799
exposure factor
blueprints
risk anlysis
38. Guide assist in the implemenation of information security based on risk managent approach
ISO/IEC 27005
security governanace
CISO
FMEA
39. Ensures reliable timely access to data/resources to authorized individuals
Information Security Management
availability
annualized rate of occurrence
strategic
40. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
security program
CobiT
confidentiality
vulnerability
41. A weakness (software - hardware - procedural - human) that can be exploited
escalation
Operationally Critical Threat - Asset - and Vulnerability Evaluation
vulnerability
chief information security officer
42. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
usage
security governanace
corporate security officer
FRAP
43. Corporate governance at the strategic level
COSO
ITIL
availability
single loss expectancy
44. Controls that implement access control - password mangement - identification and authentication methods - configuration
planning horizon
ISO/IEC 27001
technical
vulnerability scanner
45. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
COSO
vulnerability
mappers
CISO
46. IRM
qualitative
Information risk management
ISO/IEC 27799
mappers
47. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
COSO
escalation
penetration
qualitative
48. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
ISO 17799
annualized rate of occurrence
fault tree analysis
technical
49. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
qualitative
risk catagories
COSO
due care
50. The asset's value multiplied by the EF percentage - (SLE)
Failure Modes and Effect Analysis
ISO/IEC 27799
single loss expectancy
Committee of Sponsoring Organizations