SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
IRM
COSO
network mapping
BS7799
2. ISM Standard
OCTAVE
fault tree analysis
Information Security Management
elcomsoft
3. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
qualitative
penetration
FRAP
COSO
4. Potential danger to information or systems
security officer
threat
CobiT
risk
5. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
security program
ISO 17799
AS/NZS 4360
penetration
6. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
COSO
No events - Errors only - Errors and warnings - All events
port scanner
technical
7. An instance of being exposed to losses from a threat
CobiT
security program
exposure
availability
8. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
exposure factor
strategic
blueprints
Committee of Sponsoring Organizations
9. Guide to illustrate how to protect personal health information
Information Technology Infrastructure Library (ITIL)
ISO/IEC 27799
ISO/IEC 27001
usage
10. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
Failure Modes and Effect Analysis
firewall
CISO
risk mitigation
11. FRAP
Facilitated Risk Analysis Process
ISO/IEC 27001
mappers
CISO
12. FMEA
tactical
SP 800-30
security program
Failure Modes and Effect Analysis
13. Ensures reliable timely access to data/resources to authorized individuals
risk mitigation
operational
COSO
availability
14. __________ loss has a negative effect after a vulnerability is initially exploited
delayed
technical
physical
ISO/IEC 27002
15. Midterm goals
ISO 17799
due care
planning horizon
tactical
16. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
FMEA
ISO 17799
exposure
OCTAVE
17. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
AS/NZS 4360
mappers
risk analysis
technical
18. Type of audit that checks that accounts - groups and roles are correctly assigned
privilege
FMEA
SP 800-30
vulnerability scanner
19. Assurance of accurancy and reliability of information and systems
vulnerability
integrity
ISO 17799
security program
20. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
AS/NZS 4360
Control Objectives for Information and related Technology
OCTAVE
strategic
21. A log that can record outgoing requests - incoming traffic - and internet usage
firewall
OCTAVE
CISO
ISO/IEC 27002
22. CSO
usage
Control Objectives for Information and related Technology
corporate security officer
integrity
23. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
COSO
technical
penetration
BS7799
24. Ensures managment security directives are fulfilled
exposure
security officer
strategic
CobiT
25. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
IRM
FMEA
CobiT
exposure
26. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
network mapping
escalation
john the ripper
elcomsoft
27. Responsible for communicating to senior mgmt organizational risks and compliance regulations
confidentiality
data owner
CISO
ISO/IEC 27001
28. Type of audit that checks procedures and policies for escalating issues to management
delayed
security program
threat
escalation
29. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
confidentiality
SP 800-30
john the ripper
CobiT
30. The asset's value multiplied by the EF percentage - (SLE)
risk anlysis
ISO 17799
Operationally Critical Threat - Asset - and Vulnerability Evaluation
single loss expectancy
31. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
technical
Operationally Critical Threat - Asset - and Vulnerability Evaluation
ISO/IEC 27001
delayed
32. CobiT
Control Objectives for Information and related Technology
FMEA
delayed
vulnerability scanner
33. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
physical
security program
vulnerability scanner
annualized rate of occurrence
34. Risk mgmt method with much broader focus than IT security
mappers
vulnerability scanner
AS/NZS 4360
single loss expectancy
35. Type of audit that checks information classification and change control procedures
L0phtCrack
administrative
OVAL
ITIL
36. De facto standard of best practices for IT service mgmt
blueprints
administrative
Information Technology Infrastructure Library (ITIL)
ISO 17799
37. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
ISO/IEC 27004
planning horizon
risk anlysis
exposure factor
38. Controls that implement access control - password mangement - identification and authentication methods - configuration
tactical
COSO
technical
port scanner
39. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
tactical
annualized loss expectancy
qualitative
ISO 17799
40. Expected or predetermined performance level - developed from policy - performance - requirements
CobiT
firewall
risk analysis
performance baseline
41. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
john the ripper
CobiT
operational
escalation
42. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
network mapping
due care
ISO/IEC 27002
OVAL
43. Type of audit that checks that network resources - systems and software are used appropriately
fault tree analysis
security program
CobiT
usage
44. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
vulnerability
No events - Errors only - Errors and warnings - All events
Control Objectives for Information and related Technology
Facilitated Risk Analysis Process
45. An open language from mitre.org for determining vulnerabilities and problems on computer systems
administrative
OVAL
performance baseline
due care
46. Made up of ten domains - a mechanism to describe security processes
IRM
risk analysis
ISO 17799
OCTAVE
47. IT governance at the operational level
ISO/IEC 27005
CobiT
risk analysis
penetration
48. Number of time the incident might occur annually - (ARO)
CISO
annualized rate of occurrence
chief information security officer
planning horizon
49. The following tools (Nessus - Qualys - Retina) are ______________ scanners
CobiT
risk mitigation
vulnerability
corporate security officer
50. OCTAVE
CobiT
administrative
ISO/IEC 27004
Operationally Critical Threat - Asset - and Vulnerability Evaluation