SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Expected or predetermined performance level - developed from policy - performance - requirements
performance baseline
administrative
security program
risk
2. Type of audit that checks that accounts - groups and roles are correctly assigned
fault tree analysis
FMEA
privilege
chief information security officer
3. Ensures necessary level of secrecy and prevents unauthorized disclosure
AS/NZS 4360
confidentiality
annualized rate of occurrence
ITIL
4. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
ISO/IEC 27001
COSO
FRAP
Operationally Critical Threat - Asset - and Vulnerability Evaluation
5. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
CobiT
ISO/IEC 27004
blueprints
ISO/IEC 27002
6. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
firewall
usage
security program
physical
7. Daily goals focused on productivity and task-oriented activities
SP 800-30
operational
Control Objectives for Information and related Technology
FRAP
8. NIST risk management methodology
security governanace
john the ripper
ISO/IEC 27004
SP 800-30
9. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
port scanner
Committee of Sponsoring Organizations
Control Objectives for Information and related Technology
Facilitated Risk Analysis Process
10. FMEA
Failure Modes and Effect Analysis
risk
risk mitigation
usage
11. The following tools (Nessus - Qualys - Retina) are ______________ scanners
vulnerability scanner
performance monitor
security governanace
vulnerability
12. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
network mapping
COSO
security officer
protocol analyzer
13. De facto standard of best practices for IT service mgmt
Failure Modes and Effect Analysis
administrative
mappers
Information Technology Infrastructure Library (ITIL)
14. ISM Standard
ISO/IEC 27799
Information Security Management
due care
risk catagories
15. Type of audit that checks information classification and change control procedures
Committee of Sponsoring Organizations
mappers
administrative
countermeasure
16. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
CISO
protocol analyzer
risk analysis
security officer
17. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
ISO 17799
penetration
CISO
risk anlysis
18. Collection of controls an organization must have in place
FMEA
vulnerability
security program
Operationally Critical Threat - Asset - and Vulnerability Evaluation
19. The asset's value multiplied by the EF percentage - (SLE)
network mapping
corporate security officer
risk mitigation
single loss expectancy
20. Possiblity of damage and the ramifications should it occur
corporate security officer
COSO
risk
data owner
21. Event levels available for logging in a MS DNS server
countermeasure
performance monitor
No events - Errors only - Errors and warnings - All events
vulnerability
22. IT governance at the operational level
Control Objectives for Information and related Technology
CobiT
ISO/IEC 27004
annualized loss expectancy
23. __________ loss has a negative effect after a vulnerability is initially exploited
delayed
CobiT
integrity
operational
24. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
COSO
risk catagories
FMEA
vulnerability scanner
25. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
COSO
network mapping
IRM
CobiT
26. CSO
Control Objectives for Information and related Technology
network mapping
vulnerability
corporate security officer
27. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
physical
ISO 17799
mappers
strategic
28. Provides a cost/benefit comparision
Information Technology Infrastructure Library (ITIL)
administrative
CobiT
risk analysis
29. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
vulnerability scanner
CobiT
annualized loss expectancy
No events - Errors only - Errors and warnings - All events
30. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
administrative
ISO 17799
CobiT
fault tree analysis
31. Assurance of accurancy and reliability of information and systems
penetration
integrity
port scanner
risk
32. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
qualitative
AS/NZS 4360
confidentiality
risk mitigation
33. COSO
administrative
COSO
risk anlysis
Committee of Sponsoring Organizations
34. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
CobiT
performance monitor
risk analysis
technical
35. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
protocol analyzer
risk mitigation
physical
threat
36. A weakness (software - hardware - procedural - human) that can be exploited
security program
confidentiality
exposure
vulnerability
37. Type of audit that checks that network resources - systems and software are used appropriately
data owner
Information Security Management
usage
OCTAVE
38. Risk mgmt method with much broader focus than IT security
blueprints
AS/NZS 4360
security officer
confidentiality
39. OCTAVE
Operationally Critical Threat - Asset - and Vulnerability Evaluation
CobiT
network mapping
threat
40. Derived from the COSO framework
CobiT
integrity
single loss expectancy
john the ripper
41. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
elcomsoft
ISO 17799
due care
Information risk management
42. Responsible for communicating to senior mgmt organizational risks and compliance regulations
vulnerability
mappers
CISO
physical
43. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
risk analysis
OCTAVE
corporate security officer
security program
44. Ensures reliable timely access to data/resources to authorized individuals
Information Technology Infrastructure Library (ITIL)
penetration
protocol analyzer
availability
45. An open language from mitre.org for determining vulnerabilities and problems on computer systems
OVAL
single loss expectancy
security officer
risk
46. Guide assist in the implemenation of information security based on risk managent approach
corporate security officer
ISO/IEC 27005
Operationally Critical Threat - Asset - and Vulnerability Evaluation
L0phtCrack
47. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
vulnerability scanner
security program
vulnerability
BS7799
48. Midterm goals
data owner
tactical
COSO
firewall
49. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
firewall
CobiT
ISO/IEC 27005
COSO
50. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
penetration
CobiT
CobiT
mappers