SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
BS7799
FMEA
CobiT
Committee of Sponsoring Organizations
2. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
CobiT
risk mitigation
qualitative
Information Technology Infrastructure Library (ITIL)
3. Used to ID failures in a complex systems to understand underlying causes of threats
mappers
fault tree analysis
administrative
Committee of Sponsoring Organizations
4. The tools - personnel and business processes necessary to ensure that security meets needs
blueprints
security governanace
CISO
risk
5. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
OVAL
mappers
countermeasure
security program
6. __________ loss has a negative effect after a vulnerability is initially exploited
OCTAVE
FMEA
mappers
delayed
7. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
security program
network mapping
CobiT
performance monitor
8. CISO
single loss expectancy
tactical
vulnerability
chief information security officer
9. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
ISO/IEC 27002
ISO 17799
AS/NZS 4360
performance monitor
10. Risk mgmt method with much broader focus than IT security
AS/NZS 4360
FMEA
administrative
L0phtCrack
11. Assurance of accurancy and reliability of information and systems
integrity
confidentiality
vulnerability scanner
SP 800-30
12. Guide to illustrate how to protect personal health information
risk
ISO/IEC 27799
security officer
blueprints
13. ISM Standard
security officer
Information Security Management
integrity
annualized rate of occurrence
14. De facto standard of best practices for IT service mgmt
Information Technology Infrastructure Library (ITIL)
AS/NZS 4360
Facilitated Risk Analysis Process
integrity
15. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
ISO/IEC 27799
BS7799
ITIL
risk analysis
16. CSO
corporate security officer
chief information security officer
IRM
vulnerability
17. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
fault tree analysis
ISO/IEC 27001
BS7799
risk catagories
18. FMEA
Failure Modes and Effect Analysis
Facilitated Risk Analysis Process
Information Technology Infrastructure Library (ITIL)
qualitative
19. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
Failure Modes and Effect Analysis
BS7799
strategic
ISO/IEC 27002
20. Possiblity of damage and the ramifications should it occur
risk
ISO 17799
performance monitor
firewall
21. FRAP
mappers
firewall
threat
Facilitated Risk Analysis Process
22. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
tactical
elcomsoft
corporate security officer
data owner
23. The likelihood of exploitation and the loss potential
COSO
performance baseline
elcomsoft
risk
24. SLE x ARO - (ALE)
annualized loss expectancy
administrative
ISO/IEC 27001
Operationally Critical Threat - Asset - and Vulnerability Evaluation
25. Type of audit that checks that network resources - systems and software are used appropriately
tactical
usage
administrative
administrative
26. The following tools (Nessus - Qualys - Retina) are ______________ scanners
IRM
vulnerability
ISO/IEC 27002
ITIL
27. NIST risk management methodology
performance monitor
vulnerability
Control Objectives for Information and related Technology
SP 800-30
28. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
Information Technology Infrastructure Library (ITIL)
CobiT
performance monitor
risk mitigation
29. OCTAVE
FMEA
Information risk management
Operationally Critical Threat - Asset - and Vulnerability Evaluation
ISO/IEC 27799
30. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
OVAL
FRAP
COSO
Failure Modes and Effect Analysis
31. The asset's value multiplied by the EF percentage - (SLE)
single loss expectancy
fault tree analysis
risk
annualized loss expectancy
32. Tools to ID - develop - and design security requirements for business needs
blueprints
risk catagories
FRAP
performance baseline
33. IRM
Information risk management
vulnerability
ISO/IEC 27002
confidentiality
34. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
protocol analyzer
ISO 17799
annualized rate of occurrence
Control Objectives for Information and related Technology
35. Ensures necessary level of secrecy and prevents unauthorized disclosure
risk catagories
network mapping
network mapping
confidentiality
36. Derived from the COSO framework
risk
CobiT
risk catagories
network mapping
37. Midterm goals
security program
confidentiality
risk analysis
tactical
38. A weakness (software - hardware - procedural - human) that can be exploited
elcomsoft
data owner
threat
vulnerability
39. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
planning horizon
port scanner
CobiT
Committee of Sponsoring Organizations
40. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
strategic
L0phtCrack
administrative
ISO/IEC 27004
41. Percentage of an asset's value that would be lost in a single incident - (EF)
ISO/IEC 27004
OVAL
exposure factor
operational
42. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
planning horizon
ISO/IEC 27001
risk catagories
delayed
43. IT governance at the operational level
integrity
security program
CobiT
security program
44. CobiT
security program
IRM
countermeasure
Control Objectives for Information and related Technology
45. Number of time the incident might occur annually - (ARO)
CobiT
FMEA
data owner
annualized rate of occurrence
46. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
CISO
protocol analyzer
risk analysis
vulnerability
47. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
CobiT
vulnerability
confidentiality
IRM
48. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
L0phtCrack
corporate security officer
administrative
chief information security officer
49. Responsible for information classification and protection
tactical
FMEA
SP 800-30
data owner
50. Type of audit that checks procedures and policies for escalating issues to management
Control Objectives for Information and related Technology
BS7799
escalation
L0phtCrack