SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An open language from mitre.org for determining vulnerabilities and problems on computer systems
ISO 17799
protocol analyzer
annualized loss expectancy
OVAL
2. Information security managment measurements
FRAP
physical
ISO/IEC 27004
performance monitor
3. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
integrity
mappers
CobiT
ISO/IEC 27002
4. CobiT
ISO 17799
risk
chief information security officer
Control Objectives for Information and related Technology
5. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
CISO
due care
fault tree analysis
annualized loss expectancy
6. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
vulnerability
security officer
escalation
ISO/IEC 27001
7. FRAP
confidentiality
chief information security officer
Facilitated Risk Analysis Process
CISO
8. __________ loss has a negative effect after a vulnerability is initially exploited
data owner
administrative
delayed
integrity
9. The following tools (Nessus - Qualys - Retina) are ______________ scanners
OCTAVE
vulnerability
ITIL
delayed
10. Event levels available for logging in a MS DNS server
No events - Errors only - Errors and warnings - All events
exposure factor
OVAL
OCTAVE
11. Responsible for information classification and protection
Control Objectives for Information and related Technology
risk anlysis
data owner
blueprints
12. COSO
OCTAVE
availability
ISO/IEC 27799
Committee of Sponsoring Organizations
13. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
security program
Information Security Management
operational
network mapping
14. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
COSO
annualized loss expectancy
vulnerability
CobiT
15. The tools - personnel and business processes necessary to ensure that security meets needs
exposure
COSO
security governanace
security officer
16. Potential danger to information or systems
threat
Operationally Critical Threat - Asset - and Vulnerability Evaluation
data owner
elcomsoft
17. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
security program
exposure
COSO
qualitative
18. Risk mgmt method with much broader focus than IT security
risk analysis
OVAL
AS/NZS 4360
risk
19. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
Failure Modes and Effect Analysis
countermeasure
strategic
corporate security officer
20. FMEA
Failure Modes and Effect Analysis
OCTAVE
COSO
tactical
21. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
network mapping
operational
physical
due care
22. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
performance monitor
ISO/IEC 27799
risk
risk mitigation
23. An instance of being exposed to losses from a threat
risk
security program
ISO/IEC 27004
exposure
24. Ensures reliable timely access to data/resources to authorized individuals
risk analysis
security program
administrative
availability
25. IT governance at the operational level
ISO/IEC 27002
CobiT
ISO/IEC 27001
security governanace
26. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
risk analysis
data owner
COSO
security program
27. A weakness (software - hardware - procedural - human) that can be exploited
performance baseline
data owner
risk catagories
vulnerability
28. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
confidentiality
FRAP
elcomsoft
ISO/IEC 27001
29. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
network mapping
qualitative
IRM
technical
30. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
penetration
confidentiality
mappers
delayed
31. SLE x ARO - (ALE)
Operationally Critical Threat - Asset - and Vulnerability Evaluation
annualized loss expectancy
fault tree analysis
security program
32. Type of audit that checks information classification and change control procedures
administrative
vulnerability scanner
risk analysis
strategic
33. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
risk mitigation
risk catagories
mappers
ISO/IEC 27002
34. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
strategic
threat
ISO 17799
vulnerability
35. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
SP 800-30
exposure
risk
protocol analyzer
36. Ensures necessary level of secrecy and prevents unauthorized disclosure
confidentiality
countermeasure
risk
COSO
37. Type of audit that checks procedures and policies for escalating issues to management
port scanner
escalation
Failure Modes and Effect Analysis
COSO
38. IRM
Information risk management
data owner
vulnerability
countermeasure
39. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
performance baseline
Information risk management
risk anlysis
firewall
40. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
ISO/IEC 27005
risk catagories
CobiT
Information Security Management
41. CISO
ISO/IEC 27001
port scanner
chief information security officer
corporate security officer
42. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
FMEA
COSO
exposure
escalation
43. Mitigates a potential risk
COSO
ISO/IEC 27004
countermeasure
confidentiality
44. Percentage of an asset's value that would be lost in a single incident - (EF)
exposure factor
BS7799
CISO
vulnerability
45. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
security program
FMEA
AS/NZS 4360
Operationally Critical Threat - Asset - and Vulnerability Evaluation
46. Corporate governance at the strategic level
COSO
annualized loss expectancy
Information Technology Infrastructure Library (ITIL)
Control Objectives for Information and related Technology
47. Type of audit that checks that accounts - groups and roles are correctly assigned
privilege
BS7799
administrative
L0phtCrack
48. ISM Standard
risk mitigation
data owner
Information Security Management
security governanace
49. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
port scanner
availability
ISO/IEC 27005
annualized loss expectancy
50. Ensures managment security directives are fulfilled
Information Technology Infrastructure Library (ITIL)
security officer
risk
data owner