SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. SLE x ARO - (ALE)
physical
ISO/IEC 27004
COSO
annualized loss expectancy
2. Type of audit that checks that network resources - systems and software are used appropriately
usage
risk anlysis
administrative
COSO
3. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
protocol analyzer
Information Security Management
availability
ISO 17799
4. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
data owner
ISO/IEC 27002
performance monitor
vulnerability scanner
5. The likelihood of exploitation and the loss potential
risk
COSO
CISO
annualized loss expectancy
6. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
AS/NZS 4360
FMEA
CISO
data owner
7. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
annualized rate of occurrence
chief information security officer
Facilitated Risk Analysis Process
BS7799
8. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
threat
Control Objectives for Information and related Technology
FMEA
Failure Modes and Effect Analysis
9. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
COSO
security governanace
AS/NZS 4360
john the ripper
10. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
due care
OCTAVE
escalation
port scanner
11. Possiblity of damage and the ramifications should it occur
risk
exposure factor
AS/NZS 4360
vulnerability
12. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
CISO
protocol analyzer
FMEA
Information risk management
13. Ensures reliable timely access to data/resources to authorized individuals
network mapping
ISO/IEC 27002
availability
ISO 17799
14. Information security managment measurements
ISO/IEC 27004
vulnerability
risk mitigation
security governanace
15. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
risk analysis
risk mitigation
security governanace
ISO/IEC 27005
16. A weakness (software - hardware - procedural - human) that can be exploited
vulnerability
blueprints
Failure Modes and Effect Analysis
risk mitigation
17. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
annualized rate of occurrence
risk mitigation
CISO
chief information security officer
18. Assurance of accurancy and reliability of information and systems
integrity
risk
Information risk management
escalation
19. A log that can record outgoing requests - incoming traffic - and internet usage
escalation
CISO
firewall
port scanner
20. An open language from mitre.org for determining vulnerabilities and problems on computer systems
SP 800-30
chief information security officer
administrative
OVAL
21. Responsible for information classification and protection
technical
FMEA
data owner
annualized loss expectancy
22. FRAP
CobiT
elcomsoft
CISO
Facilitated Risk Analysis Process
23. Type of audit that checks information classification and change control procedures
administrative
performance baseline
vulnerability
ISO/IEC 27001
24. Focus on service level agreements between IT dept and internal customers
ITIL
risk mitigation
data owner
privilege
25. An instance of being exposed to losses from a threat
exposure
ISO/IEC 27004
risk analysis
exposure factor
26. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
CISO
Facilitated Risk Analysis Process
Committee of Sponsoring Organizations
risk analysis
27. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
administrative
risk catagories
ISO/IEC 27005
technical
28. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
risk analysis
strategic
qualitative
protocol analyzer
29. Risk mgmt method with much broader focus than IT security
risk anlysis
L0phtCrack
AS/NZS 4360
risk analysis
30. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
performance monitor
mappers
risk anlysis
CISO
31. Controls that implement access control - password mangement - identification and authentication methods - configuration
technical
risk mitigation
CobiT
CISO
32. Ensures necessary level of secrecy and prevents unauthorized disclosure
tactical
confidentiality
Information Technology Infrastructure Library (ITIL)
ITIL
33. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
IRM
ISO/IEC 27002
FRAP
security officer
34. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
security program
CISO
network mapping
risk
35. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
risk catagories
risk anlysis
risk mitigation
tactical
36. Used to ID failures in a complex systems to understand underlying causes of threats
ISO 17799
fault tree analysis
confidentiality
risk anlysis
37. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
Failure Modes and Effect Analysis
IRM
Committee of Sponsoring Organizations
data owner
38. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
countermeasure
performance monitor
john the ripper
fault tree analysis
39. The following tools (Nessus - Qualys - Retina) are ______________ scanners
Information Technology Infrastructure Library (ITIL)
vulnerability
CobiT
FMEA
40. IRM
Information risk management
CISO
operational
data owner
41. De facto standard of best practices for IT service mgmt
Information Technology Infrastructure Library (ITIL)
security governanace
strategic
BS7799
42. Type of audit that checks that accounts - groups and roles are correctly assigned
ISO/IEC 27799
qualitative
john the ripper
privilege
43. IT governance at the operational level
risk analysis
COSO
AS/NZS 4360
CobiT
44. Corporate governance at the strategic level
Operationally Critical Threat - Asset - and Vulnerability Evaluation
usage
annualized loss expectancy
COSO
45. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
strategic
risk mitigation
john the ripper
Facilitated Risk Analysis Process
46. Collection of controls an organization must have in place
Failure Modes and Effect Analysis
strategic
security program
penetration
47. Guide to illustrate how to protect personal health information
privilege
CISO
ISO/IEC 27799
security program
48. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
elcomsoft
FRAP
risk mitigation
FMEA
49. Guide assist in the implemenation of information security based on risk managent approach
ISO/IEC 27002
ISO/IEC 27005
chief information security officer
risk mitigation
50. Tools to ID - develop - and design security requirements for business needs
blueprints
risk mitigation
L0phtCrack
vulnerability scanner