SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
port scanner
elcomsoft
CISO
risk analysis
2. The likelihood of exploitation and the loss potential
risk
L0phtCrack
CobiT
blueprints
3. Type of audit that checks that accounts - groups and roles are correctly assigned
vulnerability
ISO/IEC 27001
privilege
single loss expectancy
4. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
blueprints
strategic
annualized loss expectancy
protocol analyzer
5. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
delayed
administrative
AS/NZS 4360
CISO
6. Event levels available for logging in a MS DNS server
data owner
vulnerability
protocol analyzer
No events - Errors only - Errors and warnings - All events
7. Ensures reliable timely access to data/resources to authorized individuals
security program
Operationally Critical Threat - Asset - and Vulnerability Evaluation
L0phtCrack
availability
8. FMEA
ISO 17799
performance baseline
Failure Modes and Effect Analysis
risk catagories
9. Percentage of an asset's value that would be lost in a single incident - (EF)
ISO 17799
availability
OCTAVE
exposure factor
10. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
tactical
corporate security officer
CISO
FRAP
11. Type of audit that checks procedures and policies for escalating issues to management
escalation
penetration
IRM
L0phtCrack
12. Risk mgmt method with much broader focus than IT security
security program
AS/NZS 4360
Information Security Management
Control Objectives for Information and related Technology
13. Mitigates a potential risk
blueprints
countermeasure
strategic
annualized rate of occurrence
14. Ensures managment security directives are fulfilled
ISO/IEC 27005
Committee of Sponsoring Organizations
COSO
security officer
15. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
ISO/IEC 27002
network mapping
planning horizon
CobiT
16. Type of audit that checks information classification and change control procedures
exposure
privilege
administrative
CISO
17. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
CobiT
CISO
network mapping
blueprints
18. Daily goals focused on productivity and task-oriented activities
L0phtCrack
performance monitor
fault tree analysis
operational
19. OCTAVE
CobiT
due care
mappers
Operationally Critical Threat - Asset - and Vulnerability Evaluation
20. Information security managment measurements
Information Security Management
Operationally Critical Threat - Asset - and Vulnerability Evaluation
ISO/IEC 27004
FMEA
21. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
COSO
risk
mappers
OCTAVE
22. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
vulnerability
CISO
CobiT
elcomsoft
23. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
L0phtCrack
threat
elcomsoft
CobiT
24. De facto standard of best practices for IT service mgmt
countermeasure
Information Technology Infrastructure Library (ITIL)
ISO/IEC 27004
security officer
25. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
protocol analyzer
administrative
risk
IRM
26. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
blueprints
risk analysis
SP 800-30
annualized loss expectancy
27. Used to ID failures in a complex systems to understand underlying causes of threats
confidentiality
fault tree analysis
vulnerability scanner
Committee of Sponsoring Organizations
28. Responsible for communicating to senior mgmt organizational risks and compliance regulations
technical
CISO
ITIL
vulnerability
29. The asset's value multiplied by the EF percentage - (SLE)
usage
FMEA
single loss expectancy
Failure Modes and Effect Analysis
30. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
technical
performance monitor
john the ripper
planning horizon
31. Assurance of accurancy and reliability of information and systems
integrity
CISO
blueprints
ISO/IEC 27799
32. The tools - personnel and business processes necessary to ensure that security meets needs
vulnerability scanner
CobiT
security governanace
fault tree analysis
33. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
risk mitigation
blueprints
ISO/IEC 27799
vulnerability
34. Collection of controls an organization must have in place
Information Technology Infrastructure Library (ITIL)
security program
security officer
strategic
35. __________ loss has a negative effect after a vulnerability is initially exploited
Facilitated Risk Analysis Process
ISO/IEC 27799
CobiT
delayed
36. SLE x ARO - (ALE)
annualized loss expectancy
security officer
COSO
ISO/IEC 27005
37. A log that can record outgoing requests - incoming traffic - and internet usage
network mapping
security officer
firewall
security governanace
38. CobiT
security officer
CobiT
Failure Modes and Effect Analysis
Control Objectives for Information and related Technology
39. Tools to ID - develop - and design security requirements for business needs
ISO/IEC 27001
delayed
blueprints
FMEA
40. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
ISO/IEC 27799
due care
risk analysis
john the ripper
41. Number of time the incident might occur annually - (ARO)
annualized rate of occurrence
Information Technology Infrastructure Library (ITIL)
planning horizon
CobiT
42. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
risk anlysis
Operationally Critical Threat - Asset - and Vulnerability Evaluation
corporate security officer
FMEA
43. Possiblity of damage and the ramifications should it occur
ITIL
risk
escalation
L0phtCrack
44. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
IRM
mappers
vulnerability scanner
ISO/IEC 27002
45. IRM
CobiT
Information risk management
security governanace
COSO
46. The following tools (Nessus - Qualys - Retina) are ______________ scanners
technical
mappers
FMEA
vulnerability
47. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
Facilitated Risk Analysis Process
countermeasure
vulnerability scanner
BS7799
48. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
ISO/IEC 27005
IRM
threat
FMEA
49. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
Information risk management
No events - Errors only - Errors and warnings - All events
COSO
performance monitor
50. A weakness (software - hardware - procedural - human) that can be exploited
vulnerability
COSO
Committee of Sponsoring Organizations
delayed