SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. NIST risk management methodology
CobiT
port scanner
SP 800-30
vulnerability
2. Number of time the incident might occur annually - (ARO)
annualized rate of occurrence
ISO/IEC 27799
ISO/IEC 27004
security officer
3. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
CobiT
risk analysis
strategic
ISO/IEC 27004
4. Responsible for information classification and protection
blueprints
risk
countermeasure
data owner
5. CISO
Facilitated Risk Analysis Process
Information Security Management
COSO
chief information security officer
6. Daily goals focused on productivity and task-oriented activities
ISO/IEC 27001
Information Security Management
operational
SP 800-30
7. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
network mapping
delayed
AS/NZS 4360
ISO/IEC 27004
8. CSO
confidentiality
firewall
COSO
corporate security officer
9. The tools - personnel and business processes necessary to ensure that security meets needs
security program
due care
BS7799
security governanace
10. __________ loss has a negative effect after a vulnerability is initially exploited
usage
security program
physical
delayed
11. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
Control Objectives for Information and related Technology
vulnerability
john the ripper
mappers
12. Collection of controls an organization must have in place
security program
chief information security officer
ISO/IEC 27004
availability
13. OCTAVE
security program
risk analysis
Operationally Critical Threat - Asset - and Vulnerability Evaluation
ISO/IEC 27799
14. Focus on service level agreements between IT dept and internal customers
ITIL
annualized loss expectancy
vulnerability
planning horizon
15. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
risk catagories
risk analysis
port scanner
administrative
16. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
vulnerability
firewall
elcomsoft
security officer
17. Strategic - tactical and operational planning
CobiT
countermeasure
planning horizon
ISO/IEC 27002
18. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
CobiT
SP 800-30
availability
countermeasure
19. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
port scanner
risk anlysis
ITIL
vulnerability
20. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
FRAP
security officer
CISO
Facilitated Risk Analysis Process
21. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
due care
risk catagories
OCTAVE
COSO
22. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
vulnerability
CISO
FRAP
security program
23. An open language from mitre.org for determining vulnerabilities and problems on computer systems
Failure Modes and Effect Analysis
OVAL
ISO/IEC 27005
ITIL
24. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
CobiT
exposure
privilege
single loss expectancy
25. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
Facilitated Risk Analysis Process
COSO
network mapping
mappers
26. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
CobiT
vulnerability
annualized rate of occurrence
administrative
27. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
FMEA
Failure Modes and Effect Analysis
No events - Errors only - Errors and warnings - All events
security program
28. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
due care
BS7799
annualized loss expectancy
vulnerability
29. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
Information Security Management
COSO
availability
ITIL
30. ISM Standard
elcomsoft
FMEA
Information Security Management
ISO/IEC 27004
31. Used to ID failures in a complex systems to understand underlying causes of threats
COSO
tactical
FMEA
fault tree analysis
32. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
CISO
COSO
john the ripper
risk catagories
33. Event levels available for logging in a MS DNS server
No events - Errors only - Errors and warnings - All events
vulnerability
risk
Information risk management
34. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
Information Security Management
FMEA
COSO
elcomsoft
35. Type of audit that checks information classification and change control procedures
port scanner
security program
CobiT
administrative
36. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
ISO/IEC 27004
CISO
FRAP
security program
37. Risk mgmt method with much broader focus than IT security
risk anlysis
AS/NZS 4360
strategic
OVAL
38. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
ISO/IEC 27001
qualitative
countermeasure
data owner
39. An instance of being exposed to losses from a threat
risk mitigation
ISO/IEC 27799
exposure
performance baseline
40. Made up of ten domains - a mechanism to describe security processes
ISO 17799
administrative
CISO
Information Security Management
41. Potential danger to information or systems
Committee of Sponsoring Organizations
risk
threat
operational
42. Mitigates a potential risk
risk catagories
physical
countermeasure
john the ripper
43. Ensures managment security directives are fulfilled
john the ripper
vulnerability
vulnerability
security officer
44. SLE x ARO - (ALE)
penetration
SP 800-30
annualized loss expectancy
performance monitor
45. IRM
privilege
vulnerability
Information risk management
network mapping
46. Type of audit that checks that network resources - systems and software are used appropriately
delayed
Failure Modes and Effect Analysis
usage
risk analysis
47. The following tools (Nessus - Qualys - Retina) are ______________ scanners
annualized rate of occurrence
vulnerability
Facilitated Risk Analysis Process
risk catagories
48. The asset's value multiplied by the EF percentage - (SLE)
Failure Modes and Effect Analysis
tactical
single loss expectancy
Operationally Critical Threat - Asset - and Vulnerability Evaluation
49. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
network mapping
ISO/IEC 27002
protocol analyzer
single loss expectancy
50. The likelihood of exploitation and the loss potential
risk analysis
risk
countermeasure
Committee of Sponsoring Organizations