SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. COSO
integrity
risk
risk analysis
Committee of Sponsoring Organizations
2. NIST risk management methodology
SP 800-30
qualitative
vulnerability scanner
Information Technology Infrastructure Library (ITIL)
3. Ensures reliable timely access to data/resources to authorized individuals
CobiT
technical
security governanace
availability
4. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
COSO
vulnerability
annualized rate of occurrence
risk catagories
5. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
ISO/IEC 27002
due care
CISO
port scanner
6. CISO
L0phtCrack
chief information security officer
exposure factor
administrative
7. SLE x ARO - (ALE)
COSO
annualized rate of occurrence
countermeasure
annualized loss expectancy
8. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
performance baseline
protocol analyzer
Failure Modes and Effect Analysis
COSO
9. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
vulnerability
CISO
corporate security officer
risk anlysis
10. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
risk analysis
qualitative
penetration
ISO/IEC 27005
11. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
john the ripper
Committee of Sponsoring Organizations
due care
vulnerability
12. A weakness (software - hardware - procedural - human) that can be exploited
vulnerability
CobiT
SP 800-30
security program
13. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
COSO
physical
BS7799
risk analysis
14. IT governance at the operational level
risk catagories
ITIL
CobiT
ISO/IEC 27002
15. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
administrative
exposure factor
IRM
No events - Errors only - Errors and warnings - All events
16. Collection of controls an organization must have in place
security program
ISO 17799
threat
Information Security Management
17. Made up of ten domains - a mechanism to describe security processes
ISO 17799
Information risk management
SP 800-30
administrative
18. Tools to ID - develop - and design security requirements for business needs
vulnerability scanner
john the ripper
single loss expectancy
blueprints
19. Daily goals focused on productivity and task-oriented activities
operational
Control Objectives for Information and related Technology
risk analysis
administrative
20. Corporate governance at the strategic level
risk analysis
availability
vulnerability scanner
COSO
21. ISM Standard
CobiT
COSO
planning horizon
Information Security Management
22. Guide assist in the implemenation of information security based on risk managent approach
ISO/IEC 27005
tactical
escalation
risk anlysis
23. Controls that implement access control - password mangement - identification and authentication methods - configuration
technical
ISO/IEC 27002
administrative
ISO 17799
24. OCTAVE
Operationally Critical Threat - Asset - and Vulnerability Evaluation
AS/NZS 4360
BS7799
chief information security officer
25. Guide to illustrate how to protect personal health information
blueprints
OCTAVE
ISO/IEC 27799
privilege
26. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
COSO
mappers
countermeasure
Information risk management
27. The following tools (Nessus - Qualys - Retina) are ______________ scanners
vulnerability
L0phtCrack
risk mitigation
integrity
28. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
single loss expectancy
network mapping
CobiT
vulnerability
29. Event levels available for logging in a MS DNS server
single loss expectancy
due care
ISO/IEC 27799
No events - Errors only - Errors and warnings - All events
30. Responsible for communicating to senior mgmt organizational risks and compliance regulations
risk anlysis
Committee of Sponsoring Organizations
CISO
countermeasure
31. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
L0phtCrack
due care
CobiT
administrative
32. Ensures necessary level of secrecy and prevents unauthorized disclosure
exposure
security officer
confidentiality
Failure Modes and Effect Analysis
33. CSO
Facilitated Risk Analysis Process
CobiT
operational
corporate security officer
34. Type of audit that checks that accounts - groups and roles are correctly assigned
privilege
FMEA
countermeasure
ISO/IEC 27001
35. Type of audit that checks that network resources - systems and software are used appropriately
corporate security officer
usage
No events - Errors only - Errors and warnings - All events
vulnerability
36. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
vulnerability scanner
risk catagories
security officer
risk mitigation
37. IRM
L0phtCrack
COSO
blueprints
Information risk management
38. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
escalation
CISO
ISO/IEC 27002
penetration
39. Midterm goals
tactical
ITIL
network mapping
strategic
40. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
port scanner
penetration
Failure Modes and Effect Analysis
strategic
41. FMEA
AS/NZS 4360
Failure Modes and Effect Analysis
risk analysis
Facilitated Risk Analysis Process
42. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
FMEA
single loss expectancy
network mapping
CobiT
43. Risk mgmt method with much broader focus than IT security
AS/NZS 4360
operational
vulnerability scanner
fault tree analysis
44. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
SP 800-30
ISO/IEC 27002
operational
IRM
45. An instance of being exposed to losses from a threat
vulnerability scanner
ITIL
BS7799
exposure
46. Percentage of an asset's value that would be lost in a single incident - (EF)
vulnerability
risk analysis
exposure factor
countermeasure
47. __________ loss has a negative effect after a vulnerability is initially exploited
penetration
network mapping
delayed
IRM
48. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
Failure Modes and Effect Analysis
OCTAVE
CobiT
threat
49. Derived from the COSO framework
CobiT
security program
delayed
risk anlysis
50. De facto standard of best practices for IT service mgmt
AS/NZS 4360
Information Technology Infrastructure Library (ITIL)
technical
L0phtCrack