SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. OCTAVE
OVAL
exposure factor
Operationally Critical Threat - Asset - and Vulnerability Evaluation
single loss expectancy
2. The asset's value multiplied by the EF percentage - (SLE)
privilege
integrity
usage
single loss expectancy
3. The likelihood of exploitation and the loss potential
risk
corporate security officer
risk mitigation
AS/NZS 4360
4. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
strategic
security governanace
COSO
chief information security officer
5. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
CobiT
vulnerability
risk anlysis
network mapping
6. The tools - personnel and business processes necessary to ensure that security meets needs
security governanace
COSO
performance monitor
CobiT
7. Mitigates a potential risk
firewall
ISO/IEC 27002
countermeasure
risk mitigation
8. COSO
exposure factor
penetration
ISO 17799
Committee of Sponsoring Organizations
9. Provides a cost/benefit comparision
penetration
risk analysis
Information Technology Infrastructure Library (ITIL)
Information risk management
10. SLE x ARO - (ALE)
corporate security officer
vulnerability
ISO/IEC 27005
annualized loss expectancy
11. Controls that implement access control - password mangement - identification and authentication methods - configuration
vulnerability
risk anlysis
qualitative
technical
12. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
CobiT
Facilitated Risk Analysis Process
penetration
protocol analyzer
13. Ensures reliable timely access to data/resources to authorized individuals
OCTAVE
chief information security officer
availability
john the ripper
14. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
usage
ISO 17799
john the ripper
SP 800-30
15. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
IRM
Information Technology Infrastructure Library (ITIL)
ISO 17799
FMEA
16. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
risk mitigation
risk analysis
AS/NZS 4360
tactical
17. De facto standard of best practices for IT service mgmt
risk anlysis
Information Technology Infrastructure Library (ITIL)
annualized loss expectancy
security program
18. Responsible for information classification and protection
technical
performance baseline
risk
data owner
19. The following tools (Nessus - Qualys - Retina) are ______________ scanners
vulnerability
security governanace
Facilitated Risk Analysis Process
firewall
20. Type of audit that checks that accounts - groups and roles are correctly assigned
fault tree analysis
privilege
mappers
chief information security officer
21. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
fault tree analysis
IRM
data owner
ISO/IEC 27002
22. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
john the ripper
CobiT
countermeasure
elcomsoft
23. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
data owner
performance monitor
risk
penetration
24. CISO
threat
chief information security officer
L0phtCrack
ITIL
25. Type of audit that checks that network resources - systems and software are used appropriately
usage
countermeasure
Facilitated Risk Analysis Process
security officer
26. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
ISO/IEC 27004
integrity
CISO
BS7799
27. A weakness (software - hardware - procedural - human) that can be exploited
ISO 17799
ISO/IEC 27004
security program
vulnerability
28. Focus on service level agreements between IT dept and internal customers
security program
network mapping
CISO
ITIL
29. ISM Standard
Information Security Management
vulnerability
risk analysis
OCTAVE
30. Collection of controls an organization must have in place
operational
elcomsoft
performance monitor
security program
31. NIST risk management methodology
john the ripper
SP 800-30
annualized loss expectancy
firewall
32. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
protocol analyzer
IRM
performance monitor
qualitative
33. Used to ID failures in a complex systems to understand underlying causes of threats
ISO/IEC 27005
risk analysis
fault tree analysis
elcomsoft
34. Expected or predetermined performance level - developed from policy - performance - requirements
performance baseline
FMEA
elcomsoft
annualized rate of occurrence
35. Percentage of an asset's value that would be lost in a single incident - (EF)
security governanace
network mapping
exposure factor
ISO/IEC 27799
36. Possiblity of damage and the ramifications should it occur
risk
delayed
No events - Errors only - Errors and warnings - All events
ISO/IEC 27004
37. Event levels available for logging in a MS DNS server
Operationally Critical Threat - Asset - and Vulnerability Evaluation
port scanner
No events - Errors only - Errors and warnings - All events
operational
38. An instance of being exposed to losses from a threat
qualitative
Information risk management
network mapping
exposure
39. Assurance of accurancy and reliability of information and systems
integrity
countermeasure
FMEA
CobiT
40. Information security managment measurements
CobiT
Committee of Sponsoring Organizations
CobiT
ISO/IEC 27004
41. IRM
ISO/IEC 27005
Information risk management
countermeasure
annualized rate of occurrence
42. Ensures managment security directives are fulfilled
security officer
risk analysis
FRAP
CISO
43. CSO
confidentiality
ISO/IEC 27001
corporate security officer
CobiT
44. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
ITIL
OCTAVE
privilege
mappers
45. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
delayed
risk analysis
exposure factor
physical
46. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
exposure
AS/NZS 4360
COSO
security program
47. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
OCTAVE
qualitative
penetration
confidentiality
48. IT governance at the operational level
CobiT
annualized rate of occurrence
tactical
integrity
49. Type of audit that checks information classification and change control procedures
No events - Errors only - Errors and warnings - All events
administrative
Control Objectives for Information and related Technology
COSO
50. Corporate governance at the strategic level
COSO
risk
Information risk management
corporate security officer
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests