SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Assurance of accurancy and reliability of information and systems
integrity
CobiT
Committee of Sponsoring Organizations
fault tree analysis
2. FRAP
exposure
ISO 17799
CobiT
Facilitated Risk Analysis Process
3. FMEA
Failure Modes and Effect Analysis
integrity
physical
qualitative
4. CSO
annualized rate of occurrence
corporate security officer
No events - Errors only - Errors and warnings - All events
administrative
5. Made up of ten domains - a mechanism to describe security processes
exposure
ISO 17799
CISO
Control Objectives for Information and related Technology
6. Derived from the COSO framework
data owner
due care
CobiT
security officer
7. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
L0phtCrack
AS/NZS 4360
john the ripper
performance monitor
8. An instance of being exposed to losses from a threat
security program
physical
exposure
FRAP
9. Collection of controls an organization must have in place
COSO
security program
vulnerability
blueprints
10. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
integrity
CISO
network mapping
FMEA
11. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
SP 800-30
COSO
ISO/IEC 27005
Control Objectives for Information and related Technology
12. Information security managment measurements
ISO/IEC 27004
risk analysis
firewall
ITIL
13. Type of audit that checks information classification and change control procedures
Information Technology Infrastructure Library (ITIL)
Failure Modes and Effect Analysis
administrative
exposure factor
14. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
firewall
fault tree analysis
annualized loss expectancy
CobiT
15. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
No events - Errors only - Errors and warnings - All events
technical
risk anlysis
IRM
16. ISM Standard
Information Security Management
Failure Modes and Effect Analysis
CobiT
ISO 17799
17. Potential danger to information or systems
security program
threat
CISO
ITIL
18. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
usage
availability
protocol analyzer
OCTAVE
19. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
COSO
ISO 17799
performance baseline
port scanner
20. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
security program
data owner
OVAL
Information Technology Infrastructure Library (ITIL)
21. CISO
CobiT
security program
chief information security officer
COSO
22. Ensures reliable timely access to data/resources to authorized individuals
john the ripper
FRAP
Facilitated Risk Analysis Process
availability
23. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
ISO/IEC 27001
OCTAVE
technical
mappers
24. Used to ID failures in a complex systems to understand underlying causes of threats
data owner
ISO 17799
CobiT
fault tree analysis
25. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
FMEA
COSO
single loss expectancy
port scanner
26. Ensures managment security directives are fulfilled
security officer
risk analysis
FMEA
COSO
27. Daily goals focused on productivity and task-oriented activities
Operationally Critical Threat - Asset - and Vulnerability Evaluation
security program
operational
IRM
28. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
strategic
mappers
chief information security officer
vulnerability
29. Responsible for information classification and protection
integrity
data owner
IRM
COSO
30. Guide to illustrate how to protect personal health information
BS7799
due care
ISO/IEC 27799
ISO/IEC 27005
31. Type of audit that checks procedures and policies for escalating issues to management
Information Technology Infrastructure Library (ITIL)
network mapping
planning horizon
escalation
32. The likelihood of exploitation and the loss potential
OVAL
L0phtCrack
risk
AS/NZS 4360
33. Guide assist in the implemenation of information security based on risk managent approach
Information Security Management
ISO/IEC 27005
COSO
john the ripper
34. OCTAVE
availability
network mapping
Operationally Critical Threat - Asset - and Vulnerability Evaluation
privilege
35. Risk mgmt method with much broader focus than IT security
COSO
physical
AS/NZS 4360
strategic
36. Ensures necessary level of secrecy and prevents unauthorized disclosure
network mapping
Information Technology Infrastructure Library (ITIL)
confidentiality
availability
37. Focus on service level agreements between IT dept and internal customers
ITIL
exposure factor
risk
Control Objectives for Information and related Technology
38. Number of time the incident might occur annually - (ARO)
security officer
annualized rate of occurrence
physical
due care
39. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
penetration
corporate security officer
countermeasure
firewall
40. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
physical
john the ripper
technical
vulnerability
41. Controls that implement access control - password mangement - identification and authentication methods - configuration
vulnerability scanner
technical
BS7799
ISO/IEC 27005
42. Corporate governance at the strategic level
blueprints
performance baseline
risk
COSO
43. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
network mapping
COSO
tactical
chief information security officer
44. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
vulnerability
ISO 17799
administrative
IRM
45. The tools - personnel and business processes necessary to ensure that security meets needs
L0phtCrack
ISO/IEC 27002
vulnerability scanner
security governanace
46. IT governance at the operational level
ISO 17799
L0phtCrack
CobiT
Operationally Critical Threat - Asset - and Vulnerability Evaluation
47. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
Information Technology Infrastructure Library (ITIL)
performance baseline
exposure
risk mitigation
48. IRM
Information risk management
SP 800-30
physical
john the ripper
49. Mitigates a potential risk
countermeasure
exposure factor
protocol analyzer
FRAP
50. COSO
FRAP
Committee of Sponsoring Organizations
single loss expectancy
network mapping
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests