SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
CobiT
CobiT
Information Technology Infrastructure Library (ITIL)
risk mitigation
2. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
delayed
network mapping
BS7799
risk catagories
3. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
technical
delayed
COSO
performance baseline
4. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
tactical
FMEA
CobiT
qualitative
5. Tools to ID - develop - and design security requirements for business needs
FRAP
blueprints
FMEA
fault tree analysis
6. CSO
annualized loss expectancy
corporate security officer
exposure factor
security governanace
7. SLE x ARO - (ALE)
Operationally Critical Threat - Asset - and Vulnerability Evaluation
integrity
annualized loss expectancy
SP 800-30
8. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
john the ripper
technical
operational
strategic
9. De facto standard of best practices for IT service mgmt
Information Technology Infrastructure Library (ITIL)
risk anlysis
protocol analyzer
blueprints
10. Responsible for information classification and protection
threat
data owner
FMEA
AS/NZS 4360
11. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
IRM
CobiT
risk analysis
escalation
12. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
corporate security officer
physical
L0phtCrack
penetration
13. Mitigates a potential risk
risk
corporate security officer
qualitative
countermeasure
14. CobiT
vulnerability
strategic
privilege
Control Objectives for Information and related Technology
15. FRAP
performance baseline
Facilitated Risk Analysis Process
physical
network mapping
16. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
ISO/IEC 27002
security program
exposure
vulnerability
17. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
security officer
qualitative
FMEA
BS7799
18. Made up of ten domains - a mechanism to describe security processes
No events - Errors only - Errors and warnings - All events
Information Technology Infrastructure Library (ITIL)
threat
ISO 17799
19. Strategic - tactical and operational planning
COSO
planning horizon
COSO
security program
20. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
single loss expectancy
risk anlysis
CISO
CobiT
21. Potential danger to information or systems
CobiT
annualized rate of occurrence
operational
threat
22. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
risk catagories
mappers
corporate security officer
risk analysis
23. Controls that implement access control - password mangement - identification and authentication methods - configuration
escalation
technical
fault tree analysis
Facilitated Risk Analysis Process
24. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
administrative
privilege
security program
due care
25. Type of audit that checks that accounts - groups and roles are correctly assigned
privilege
corporate security officer
vulnerability
ISO/IEC 27005
26. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
FRAP
tactical
Information Security Management
CobiT
27. __________ loss has a negative effect after a vulnerability is initially exploited
data owner
CobiT
administrative
delayed
28. Collection of controls an organization must have in place
technical
security program
planning horizon
ITIL
29. IRM
fault tree analysis
COSO
Information risk management
AS/NZS 4360
30. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
strategic
risk anlysis
mappers
chief information security officer
31. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
security governanace
usage
COSO
single loss expectancy
32. Responsible for communicating to senior mgmt organizational risks and compliance regulations
annualized rate of occurrence
escalation
CISO
COSO
33. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
john the ripper
network mapping
technical
security program
34. IT governance at the operational level
usage
risk catagories
corporate security officer
CobiT
35. Guide assist in the implemenation of information security based on risk managent approach
IRM
ISO/IEC 27001
ISO/IEC 27005
due care
36. ISM Standard
privilege
CobiT
Information Security Management
ISO/IEC 27004
37. Information security managment measurements
ISO/IEC 27004
integrity
countermeasure
vulnerability
38. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
security program
risk catagories
availability
planning horizon
39. NIST risk management methodology
performance baseline
CobiT
SP 800-30
Operationally Critical Threat - Asset - and Vulnerability Evaluation
40. COSO
Committee of Sponsoring Organizations
port scanner
delayed
ISO/IEC 27002
41. The tools - personnel and business processes necessary to ensure that security meets needs
escalation
security governanace
FRAP
Information risk management
42. Daily goals focused on productivity and task-oriented activities
performance baseline
operational
delayed
SP 800-30
43. Derived from the COSO framework
CobiT
Committee of Sponsoring Organizations
COSO
COSO
44. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
integrity
ISO/IEC 27001
single loss expectancy
ISO 17799
45. A weakness (software - hardware - procedural - human) that can be exploited
network mapping
CobiT
vulnerability
CISO
46. The following tools (Nessus - Qualys - Retina) are ______________ scanners
vulnerability
security officer
fault tree analysis
performance baseline
47. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
annualized loss expectancy
Information Security Management
network mapping
Facilitated Risk Analysis Process
48. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
performance monitor
ISO 17799
physical
vulnerability scanner
49. CISO
single loss expectancy
blueprints
chief information security officer
ISO/IEC 27001
50. Type of audit that checks that network resources - systems and software are used appropriately
usage
Facilitated Risk Analysis Process
No events - Errors only - Errors and warnings - All events
planning horizon