SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Event levels available for logging in a MS DNS server
risk analysis
No events - Errors only - Errors and warnings - All events
L0phtCrack
countermeasure
2. CSO
corporate security officer
risk analysis
physical
OCTAVE
3. NIST risk management methodology
BS7799
No events - Errors only - Errors and warnings - All events
privilege
SP 800-30
4. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
countermeasure
risk analysis
Operationally Critical Threat - Asset - and Vulnerability Evaluation
escalation
5. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
Information Security Management
port scanner
vulnerability
john the ripper
6. Focus on service level agreements between IT dept and internal customers
COSO
Information risk management
ITIL
risk
7. Mitigates a potential risk
performance monitor
countermeasure
protocol analyzer
Information Security Management
8. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
port scanner
tactical
vulnerability
COSO
9. The asset's value multiplied by the EF percentage - (SLE)
L0phtCrack
single loss expectancy
ISO 17799
FMEA
10. A log that can record outgoing requests - incoming traffic - and internet usage
firewall
annualized rate of occurrence
risk
COSO
11. De facto standard of best practices for IT service mgmt
Information Technology Infrastructure Library (ITIL)
due care
ISO/IEC 27001
exposure factor
12. Risk mgmt method with much broader focus than IT security
privilege
AS/NZS 4360
Operationally Critical Threat - Asset - and Vulnerability Evaluation
FRAP
13. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
elcomsoft
Facilitated Risk Analysis Process
penetration
FMEA
14. __________ loss has a negative effect after a vulnerability is initially exploited
usage
FMEA
delayed
vulnerability
15. Used to ID failures in a complex systems to understand underlying causes of threats
escalation
fault tree analysis
ISO/IEC 27799
risk anlysis
16. Type of audit that checks information classification and change control procedures
AS/NZS 4360
administrative
vulnerability
risk
17. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
penetration
physical
due care
Facilitated Risk Analysis Process
18. Type of audit that checks procedures and policies for escalating issues to management
COSO
vulnerability
FRAP
escalation
19. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
exposure
COSO
protocol analyzer
OCTAVE
20. COSO
Committee of Sponsoring Organizations
chief information security officer
threat
elcomsoft
21. Derived from the COSO framework
single loss expectancy
integrity
CobiT
risk mitigation
22. Type of audit that checks that network resources - systems and software are used appropriately
john the ripper
risk analysis
Information Technology Infrastructure Library (ITIL)
usage
23. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
ISO/IEC 27005
vulnerability scanner
ISO/IEC 27001
physical
24. SLE x ARO - (ALE)
escalation
annualized loss expectancy
ISO/IEC 27005
integrity
25. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
corporate security officer
security program
FMEA
annualized rate of occurrence
26. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
administrative
COSO
OCTAVE
vulnerability
27. Ensures managment security directives are fulfilled
security officer
AS/NZS 4360
Committee of Sponsoring Organizations
FRAP
28. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
mappers
CobiT
administrative
vulnerability scanner
29. Type of audit that checks that accounts - groups and roles are correctly assigned
COSO
CobiT
risk analysis
privilege
30. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
vulnerability
L0phtCrack
risk analysis
FRAP
31. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
security program
ISO/IEC 27001
Operationally Critical Threat - Asset - and Vulnerability Evaluation
privilege
32. Expected or predetermined performance level - developed from policy - performance - requirements
exposure factor
privilege
security program
performance baseline
33. Responsible for information classification and protection
data owner
annualized rate of occurrence
blueprints
ISO/IEC 27799
34. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
annualized loss expectancy
chief information security officer
exposure factor
penetration
35. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
CISO
network mapping
FRAP
Facilitated Risk Analysis Process
36. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
L0phtCrack
risk
integrity
performance monitor
37. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
COSO
network mapping
john the ripper
ISO/IEC 27005
38. FMEA
Committee of Sponsoring Organizations
Failure Modes and Effect Analysis
FMEA
protocol analyzer
39. Corporate governance at the strategic level
data owner
network mapping
COSO
IRM
40. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
COSO
administrative
usage
BS7799
41. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
BS7799
ISO/IEC 27005
FMEA
protocol analyzer
42. Guide assist in the implemenation of information security based on risk managent approach
COSO
ISO/IEC 27005
ISO/IEC 27004
protocol analyzer
43. ISM Standard
OVAL
administrative
Information Security Management
physical
44. Responsible for communicating to senior mgmt organizational risks and compliance regulations
physical
CobiT
ISO 17799
CISO
45. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
strategic
protocol analyzer
annualized loss expectancy
BS7799
46. Controls that implement access control - password mangement - identification and authentication methods - configuration
technical
Information Security Management
risk anlysis
annualized loss expectancy
47. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
OCTAVE
performance baseline
risk catagories
privilege
48. A weakness (software - hardware - procedural - human) that can be exploited
vulnerability
due care
john the ripper
risk mitigation
49. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
physical
risk
penetration
tactical
50. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
CISO
blueprints
ISO/IEC 27002
qualitative