SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Event levels available for logging in a MS DNS server
AS/NZS 4360
CobiT
single loss expectancy
No events - Errors only - Errors and warnings - All events
2. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
exposure factor
fault tree analysis
risk catagories
administrative
3. CSO
Control Objectives for Information and related Technology
annualized loss expectancy
countermeasure
corporate security officer
4. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
ISO/IEC 27002
FMEA
Information Security Management
IRM
5. Made up of ten domains - a mechanism to describe security processes
CISO
ISO 17799
usage
Information risk management
6. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
performance monitor
network mapping
CISO
risk analysis
7. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
penetration
vulnerability
risk analysis
CobiT
8. ISM Standard
Information Security Management
Control Objectives for Information and related Technology
firewall
ISO/IEC 27002
9. Possiblity of damage and the ramifications should it occur
administrative
risk
OVAL
usage
10. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
vulnerability
annualized rate of occurrence
due care
risk
11. An instance of being exposed to losses from a threat
exposure
CISO
OVAL
OCTAVE
12. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
CobiT
ISO/IEC 27004
performance baseline
IRM
13. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
performance baseline
OCTAVE
vulnerability scanner
tactical
14. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
SP 800-30
risk anlysis
penetration
CobiT
15. __________ loss has a negative effect after a vulnerability is initially exploited
Failure Modes and Effect Analysis
delayed
OCTAVE
risk
16. IT governance at the operational level
CobiT
vulnerability
usage
Operationally Critical Threat - Asset - and Vulnerability Evaluation
17. Ensures necessary level of secrecy and prevents unauthorized disclosure
qualitative
ISO 17799
confidentiality
security officer
18. Midterm goals
security program
COSO
BS7799
tactical
19. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
elcomsoft
port scanner
FMEA
COSO
20. Collection of controls an organization must have in place
security program
penetration
port scanner
planning horizon
21. FMEA
Failure Modes and Effect Analysis
annualized loss expectancy
physical
Control Objectives for Information and related Technology
22. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
security officer
CISO
confidentiality
L0phtCrack
23. Expected or predetermined performance level - developed from policy - performance - requirements
risk
IRM
performance baseline
CobiT
24. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
mappers
penetration
FMEA
elcomsoft
25. Potential danger to information or systems
threat
physical
OCTAVE
data owner
26. Number of time the incident might occur annually - (ARO)
annualized rate of occurrence
integrity
administrative
FMEA
27. Used to ID failures in a complex systems to understand underlying causes of threats
administrative
fault tree analysis
confidentiality
privilege
28. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
strategic
performance monitor
CISO
No events - Errors only - Errors and warnings - All events
29. The following tools (Nessus - Qualys - Retina) are ______________ scanners
security program
vulnerability
Failure Modes and Effect Analysis
single loss expectancy
30. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
planning horizon
CobiT
network mapping
CobiT
31. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
qualitative
usage
risk
single loss expectancy
32. A log that can record outgoing requests - incoming traffic - and internet usage
firewall
SP 800-30
confidentiality
vulnerability
33. OCTAVE
Facilitated Risk Analysis Process
CISO
Operationally Critical Threat - Asset - and Vulnerability Evaluation
elcomsoft
34. Assurance of accurancy and reliability of information and systems
integrity
corporate security officer
Control Objectives for Information and related Technology
AS/NZS 4360
35. Ensures managment security directives are fulfilled
strategic
security officer
risk catagories
FRAP
36. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
penetration
CISO
technical
COSO
37. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
single loss expectancy
CobiT
vulnerability
confidentiality
38. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
Information Technology Infrastructure Library (ITIL)
chief information security officer
administrative
john the ripper
39. The likelihood of exploitation and the loss potential
Information Security Management
blueprints
ITIL
risk
40. Focus on service level agreements between IT dept and internal customers
ISO/IEC 27004
security officer
CobiT
ITIL
41. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
performance monitor
FMEA
Committee of Sponsoring Organizations
administrative
42. NIST risk management methodology
SP 800-30
administrative
security officer
confidentiality
43. CobiT
ISO/IEC 27799
privilege
risk
Control Objectives for Information and related Technology
44. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
COSO
vulnerability
Information Technology Infrastructure Library (ITIL)
john the ripper
45. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
delayed
exposure
ISO/IEC 27001
vulnerability
46. Mitigates a potential risk
vulnerability
single loss expectancy
availability
countermeasure
47. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
L0phtCrack
annualized rate of occurrence
security program
AS/NZS 4360
48. The tools - personnel and business processes necessary to ensure that security meets needs
fault tree analysis
Information risk management
security governanace
OCTAVE
49. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
vulnerability
Committee of Sponsoring Organizations
port scanner
ISO/IEC 27799
50. Ensures reliable timely access to data/resources to authorized individuals
technical
vulnerability
availability
vulnerability