SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IT governance at the operational level
CobiT
ISO/IEC 27004
fault tree analysis
blueprints
2. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
ISO/IEC 27001
privilege
vulnerability
blueprints
3. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
vulnerability
penetration
FMEA
single loss expectancy
4. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
COSO
administrative
performance monitor
No events - Errors only - Errors and warnings - All events
5. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
privilege
FRAP
corporate security officer
COSO
6. Potential danger to information or systems
threat
Committee of Sponsoring Organizations
security program
CISO
7. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
threat
ISO/IEC 27002
vulnerability scanner
BS7799
8. IRM
mappers
Information risk management
risk mitigation
Control Objectives for Information and related Technology
9. Type of audit that checks that accounts - groups and roles are correctly assigned
CISO
data owner
privilege
annualized loss expectancy
10. Possiblity of damage and the ramifications should it occur
risk analysis
mappers
IRM
risk
11. Responsible for information classification and protection
blueprints
single loss expectancy
data owner
security governanace
12. Ensures necessary level of secrecy and prevents unauthorized disclosure
SP 800-30
network mapping
administrative
confidentiality
13. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
ISO/IEC 27002
Information Technology Infrastructure Library (ITIL)
port scanner
BS7799
14. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
mappers
john the ripper
vulnerability
performance baseline
15. Information security managment measurements
security officer
CISO
ISO/IEC 27005
ISO/IEC 27004
16. CobiT
BS7799
exposure
annualized rate of occurrence
Control Objectives for Information and related Technology
17. Tools to ID - develop - and design security requirements for business needs
privilege
qualitative
blueprints
mappers
18. Used to ID failures in a complex systems to understand underlying causes of threats
risk mitigation
ISO 17799
fault tree analysis
firewall
19. Focus on service level agreements between IT dept and internal customers
COSO
ITIL
delayed
exposure
20. COSO
Committee of Sponsoring Organizations
ISO/IEC 27799
annualized loss expectancy
OCTAVE
21. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
L0phtCrack
fault tree analysis
AS/NZS 4360
ISO/IEC 27799
22. Made up of ten domains - a mechanism to describe security processes
ISO 17799
vulnerability
Information risk management
chief information security officer
23. CSO
confidentiality
technical
corporate security officer
COSO
24. Strategic - tactical and operational planning
confidentiality
No events - Errors only - Errors and warnings - All events
ISO/IEC 27005
planning horizon
25. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
network mapping
ISO/IEC 27001
due care
delayed
26. Provides a cost/benefit comparision
availability
OCTAVE
strategic
risk analysis
27. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
FMEA
protocol analyzer
CobiT
planning horizon
28. Ensures reliable timely access to data/resources to authorized individuals
availability
port scanner
usage
annualized loss expectancy
29. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
risk mitigation
port scanner
ISO/IEC 27002
usage
30. A weakness (software - hardware - procedural - human) that can be exploited
strategic
due care
COSO
vulnerability
31. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
Failure Modes and Effect Analysis
risk catagories
COSO
risk analysis
32. __________ loss has a negative effect after a vulnerability is initially exploited
delayed
vulnerability
risk analysis
ISO/IEC 27005
33. Collection of controls an organization must have in place
security program
fault tree analysis
ISO/IEC 27005
administrative
34. Mitigates a potential risk
countermeasure
ISO/IEC 27002
mappers
protocol analyzer
35. Responsible for communicating to senior mgmt organizational risks and compliance regulations
security program
ITIL
CISO
Operationally Critical Threat - Asset - and Vulnerability Evaluation
36. The likelihood of exploitation and the loss potential
Facilitated Risk Analysis Process
chief information security officer
risk
vulnerability
37. The tools - personnel and business processes necessary to ensure that security meets needs
vulnerability
security governanace
ITIL
risk analysis
38. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
usage
risk
L0phtCrack
john the ripper
39. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
performance baseline
elcomsoft
risk mitigation
ISO/IEC 27799
40. Guide to illustrate how to protect personal health information
ISO/IEC 27799
protocol analyzer
ISO/IEC 27002
availability
41. CISO
chief information security officer
annualized loss expectancy
mappers
ISO/IEC 27004
42. Event levels available for logging in a MS DNS server
No events - Errors only - Errors and warnings - All events
Committee of Sponsoring Organizations
chief information security officer
performance monitor
43. An open language from mitre.org for determining vulnerabilities and problems on computer systems
Committee of Sponsoring Organizations
availability
AS/NZS 4360
OVAL
44. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
security program
availability
operational
FMEA
45. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
administrative
L0phtCrack
risk mitigation
CISO
46. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
CobiT
technical
availability
Control Objectives for Information and related Technology
47. A log that can record outgoing requests - incoming traffic - and internet usage
annualized rate of occurrence
firewall
risk catagories
performance baseline
48. Midterm goals
No events - Errors only - Errors and warnings - All events
security program
tactical
qualitative
49. Daily goals focused on productivity and task-oriented activities
risk
vulnerability
operational
usage
50. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
availability
OCTAVE
port scanner
fault tree analysis