SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Mitigates a potential risk
countermeasure
ISO 17799
FMEA
confidentiality
2. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
escalation
Failure Modes and Effect Analysis
FMEA
vulnerability
3. Possiblity of damage and the ramifications should it occur
risk
ISO/IEC 27799
ISO/IEC 27004
ISO/IEC 27005
4. The likelihood of exploitation and the loss potential
risk
CobiT
elcomsoft
Failure Modes and Effect Analysis
5. Information security managment measurements
ISO/IEC 27004
elcomsoft
threat
vulnerability
6. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
single loss expectancy
administrative
L0phtCrack
exposure
7. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
threat
FMEA
Information Security Management
CobiT
8. Used to ID failures in a complex systems to understand underlying causes of threats
usage
No events - Errors only - Errors and warnings - All events
COSO
fault tree analysis
9. Number of time the incident might occur annually - (ARO)
FMEA
vulnerability
CobiT
annualized rate of occurrence
10. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
FMEA
security governanace
CobiT
escalation
11. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
BS7799
risk mitigation
vulnerability
security program
12. Percentage of an asset's value that would be lost in a single incident - (EF)
qualitative
Facilitated Risk Analysis Process
exposure factor
CobiT
13. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
COSO
COSO
performance monitor
CISO
14. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
exposure
SP 800-30
protocol analyzer
CobiT
15. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
risk anlysis
L0phtCrack
strategic
administrative
16. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
performance monitor
ISO/IEC 27001
vulnerability
IRM
17. Expected or predetermined performance level - developed from policy - performance - requirements
integrity
Facilitated Risk Analysis Process
performance baseline
CobiT
18. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
Facilitated Risk Analysis Process
annualized rate of occurrence
L0phtCrack
risk anlysis
19. Tools to ID - develop - and design security requirements for business needs
network mapping
blueprints
security officer
ITIL
20. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
Information Technology Infrastructure Library (ITIL)
ISO/IEC 27002
due care
performance monitor
21. CISO
chief information security officer
risk
corporate security officer
COSO
22. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
firewall
elcomsoft
exposure factor
tactical
23. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
delayed
BS7799
OCTAVE
ISO 17799
24. Ensures reliable timely access to data/resources to authorized individuals
Operationally Critical Threat - Asset - and Vulnerability Evaluation
availability
operational
AS/NZS 4360
25. The asset's value multiplied by the EF percentage - (SLE)
protocol analyzer
vulnerability
single loss expectancy
availability
26. Event levels available for logging in a MS DNS server
No events - Errors only - Errors and warnings - All events
due care
network mapping
COSO
27. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
technical
OCTAVE
fault tree analysis
qualitative
28. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
corporate security officer
risk catagories
ISO 17799
Information Technology Infrastructure Library (ITIL)
29. Type of audit that checks procedures and policies for escalating issues to management
risk
protocol analyzer
delayed
escalation
30. Collection of controls an organization must have in place
Information risk management
security program
OVAL
Failure Modes and Effect Analysis
31. COSO
network mapping
Committee of Sponsoring Organizations
IRM
elcomsoft
32. Guide to illustrate how to protect personal health information
CobiT
ISO/IEC 27799
security governanace
Committee of Sponsoring Organizations
33. Type of audit that checks that network resources - systems and software are used appropriately
data owner
usage
Information Technology Infrastructure Library (ITIL)
network mapping
34. Responsible for information classification and protection
data owner
AS/NZS 4360
exposure factor
CISO
35. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
ISO/IEC 27004
john the ripper
penetration
corporate security officer
36. FMEA
annualized rate of occurrence
Failure Modes and Effect Analysis
CobiT
CISO
37. IRM
Information risk management
BS7799
Facilitated Risk Analysis Process
strategic
38. Ensures managment security directives are fulfilled
security officer
administrative
CobiT
corporate security officer
39. Derived from the COSO framework
chief information security officer
CobiT
CISO
CISO
40. Focus on service level agreements between IT dept and internal customers
firewall
Operationally Critical Threat - Asset - and Vulnerability Evaluation
exposure factor
ITIL
41. De facto standard of best practices for IT service mgmt
Information Technology Infrastructure Library (ITIL)
privilege
Committee of Sponsoring Organizations
ISO/IEC 27799
42. __________ loss has a negative effect after a vulnerability is initially exploited
exposure
penetration
elcomsoft
delayed
43. Controls that implement access control - password mangement - identification and authentication methods - configuration
FMEA
COSO
CobiT
technical
44. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
BS7799
security governanace
network mapping
elcomsoft
45. Assurance of accurancy and reliability of information and systems
technical
ITIL
COSO
integrity
46. Guide assist in the implemenation of information security based on risk managent approach
COSO
ISO/IEC 27005
FMEA
penetration
47. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
ISO/IEC 27004
vulnerability scanner
data owner
risk catagories
48. Provides a cost/benefit comparision
network mapping
L0phtCrack
risk analysis
risk
49. Strategic - tactical and operational planning
fault tree analysis
blueprints
planning horizon
COSO
50. Corporate governance at the strategic level
COSO
annualized rate of occurrence
No events - Errors only - Errors and warnings - All events
vulnerability