SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. NIST risk management methodology
Information Technology Infrastructure Library (ITIL)
qualitative
SP 800-30
performance baseline
2. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
ISO/IEC 27001
delayed
OVAL
fault tree analysis
3. Derived from the COSO framework
ISO/IEC 27004
COSO
CobiT
ISO/IEC 27001
4. Guide assist in the implemenation of information security based on risk managent approach
escalation
operational
annualized loss expectancy
ISO/IEC 27005
5. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
network mapping
protocol analyzer
security officer
ITIL
6. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
L0phtCrack
blueprints
CobiT
Failure Modes and Effect Analysis
7. Possiblity of damage and the ramifications should it occur
risk
operational
vulnerability
ISO/IEC 27001
8. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
ISO/IEC 27002
Failure Modes and Effect Analysis
FMEA
CobiT
9. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
OCTAVE
availability
administrative
ISO/IEC 27001
10. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
blueprints
L0phtCrack
BS7799
vulnerability scanner
11. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
strategic
firewall
network mapping
risk mitigation
12. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
technical
security officer
security program
physical
13. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
escalation
administrative
Control Objectives for Information and related Technology
risk catagories
14. Ensures reliable timely access to data/resources to authorized individuals
CISO
availability
exposure factor
blueprints
15. The following tools (Nessus - Qualys - Retina) are ______________ scanners
ISO/IEC 27001
Operationally Critical Threat - Asset - and Vulnerability Evaluation
vulnerability
countermeasure
16. Controls that implement access control - password mangement - identification and authentication methods - configuration
annualized rate of occurrence
CobiT
technical
security officer
17. Percentage of an asset's value that would be lost in a single incident - (EF)
port scanner
due care
integrity
exposure factor
18. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
protocol analyzer
risk anlysis
data owner
integrity
19. Collection of controls an organization must have in place
risk analysis
security program
ISO 17799
planning horizon
20. Risk mgmt method with much broader focus than IT security
performance baseline
risk
AS/NZS 4360
SP 800-30
21. Responsible for communicating to senior mgmt organizational risks and compliance regulations
Information risk management
CISO
Operationally Critical Threat - Asset - and Vulnerability Evaluation
exposure
22. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
integrity
due care
COSO
administrative
23. OCTAVE
Failure Modes and Effect Analysis
Operationally Critical Threat - Asset - and Vulnerability Evaluation
elcomsoft
security program
24. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
security program
availability
COSO
risk analysis
25. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
penetration
performance baseline
annualized rate of occurrence
vulnerability
26. Assurance of accurancy and reliability of information and systems
integrity
CobiT
risk
ISO 17799
27. Corporate governance at the strategic level
availability
CobiT
privilege
COSO
28. Event levels available for logging in a MS DNS server
security governanace
No events - Errors only - Errors and warnings - All events
elcomsoft
qualitative
29. The asset's value multiplied by the EF percentage - (SLE)
chief information security officer
administrative
single loss expectancy
Operationally Critical Threat - Asset - and Vulnerability Evaluation
30. Ensures necessary level of secrecy and prevents unauthorized disclosure
technical
risk
confidentiality
exposure
31. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
risk catagories
Failure Modes and Effect Analysis
protocol analyzer
john the ripper
32. IT governance at the operational level
security program
blueprints
CobiT
availability
33. Number of time the incident might occur annually - (ARO)
annualized rate of occurrence
FMEA
privilege
CobiT
34. IRM
corporate security officer
FMEA
security program
Information risk management
35. FRAP
CobiT
Facilitated Risk Analysis Process
single loss expectancy
technical
36. Responsible for information classification and protection
technical
Operationally Critical Threat - Asset - and Vulnerability Evaluation
data owner
availability
37. Provides a cost/benefit comparision
penetration
risk analysis
CISO
performance baseline
38. Potential danger to information or systems
elcomsoft
threat
qualitative
planning horizon
39. Focus on service level agreements between IT dept and internal customers
CobiT
single loss expectancy
risk
ITIL
40. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
vulnerability
SP 800-30
FMEA
BS7799
41. Used to ID failures in a complex systems to understand underlying causes of threats
COSO
vulnerability scanner
tactical
fault tree analysis
42. __________ loss has a negative effect after a vulnerability is initially exploited
usage
delayed
risk
technical
43. CobiT
CobiT
port scanner
SP 800-30
Control Objectives for Information and related Technology
44. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
chief information security officer
elcomsoft
risk
administrative
45. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
port scanner
qualitative
Information Security Management
Information risk management
46. Information security managment measurements
ISO/IEC 27004
vulnerability
data owner
integrity
47. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
confidentiality
performance monitor
risk mitigation
usage
48. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
countermeasure
security officer
FMEA
FRAP
49. A log that can record outgoing requests - incoming traffic - and internet usage
firewall
delayed
integrity
annualized loss expectancy
50. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
administrative
elcomsoft
countermeasure
tactical