SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. SLE x ARO - (ALE)
annualized loss expectancy
administrative
security program
risk anlysis
2. Collection of controls an organization must have in place
ISO 17799
security program
Facilitated Risk Analysis Process
Control Objectives for Information and related Technology
3. Responsible for communicating to senior mgmt organizational risks and compliance regulations
CISO
ISO 17799
ISO/IEC 27002
risk analysis
4. OCTAVE
penetration
Operationally Critical Threat - Asset - and Vulnerability Evaluation
data owner
SP 800-30
5. An open language from mitre.org for determining vulnerabilities and problems on computer systems
IRM
Operationally Critical Threat - Asset - and Vulnerability Evaluation
OVAL
integrity
6. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
BS7799
physical
annualized rate of occurrence
ISO/IEC 27001
7. Provides a cost/benefit comparision
confidentiality
FMEA
planning horizon
risk analysis
8. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
risk
No events - Errors only - Errors and warnings - All events
risk anlysis
Facilitated Risk Analysis Process
9. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
port scanner
privilege
technical
corporate security officer
10. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
blueprints
network mapping
COSO
qualitative
11. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
COSO
privilege
mappers
FMEA
12. CISO
OVAL
chief information security officer
Control Objectives for Information and related Technology
confidentiality
13. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
risk catagories
Information risk management
security officer
physical
14. __________ loss has a negative effect after a vulnerability is initially exploited
Facilitated Risk Analysis Process
network mapping
delayed
risk analysis
15. Ensures reliable timely access to data/resources to authorized individuals
Control Objectives for Information and related Technology
data owner
availability
planning horizon
16. Mitigates a potential risk
performance monitor
CobiT
risk
countermeasure
17. Type of audit that checks that network resources - systems and software are used appropriately
CISO
security officer
exposure
usage
18. Responsible for information classification and protection
vulnerability scanner
physical
data owner
ISO/IEC 27002
19. A log that can record outgoing requests - incoming traffic - and internet usage
BS7799
risk analysis
firewall
network mapping
20. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
IRM
planning horizon
ISO 17799
risk
21. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
Control Objectives for Information and related Technology
ISO/IEC 27004
network mapping
CISO
22. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
Information Technology Infrastructure Library (ITIL)
protocol analyzer
CobiT
COSO
23. ISM Standard
confidentiality
Information Security Management
SP 800-30
annualized loss expectancy
24. Ensures managment security directives are fulfilled
protocol analyzer
security officer
blueprints
john the ripper
25. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
FRAP
FMEA
OCTAVE
BS7799
26. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
administrative
OCTAVE
Information Technology Infrastructure Library (ITIL)
exposure factor
27. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
countermeasure
operational
security program
risk anlysis
28. Ensures necessary level of secrecy and prevents unauthorized disclosure
risk
single loss expectancy
port scanner
confidentiality
29. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
integrity
FMEA
exposure
strategic
30. FRAP
delayed
Facilitated Risk Analysis Process
COSO
risk mitigation
31. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
privilege
vulnerability scanner
usage
corporate security officer
32. Assurance of accurancy and reliability of information and systems
IRM
integrity
vulnerability
delayed
33. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
Information Security Management
Information risk management
vulnerability
ISO 17799
34. Tools to ID - develop - and design security requirements for business needs
usage
qualitative
network mapping
blueprints
35. IRM
vulnerability scanner
exposure
Information risk management
planning horizon
36. Focus on service level agreements between IT dept and internal customers
integrity
mappers
ITIL
administrative
37. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
network mapping
countermeasure
security governanace
SP 800-30
38. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
ISO/IEC 27799
BS7799
mappers
annualized rate of occurrence
39. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
exposure factor
qualitative
administrative
performance baseline
40. De facto standard of best practices for IT service mgmt
exposure
risk analysis
IRM
Information Technology Infrastructure Library (ITIL)
41. An instance of being exposed to losses from a threat
security officer
exposure
physical
confidentiality
42. Event levels available for logging in a MS DNS server
No events - Errors only - Errors and warnings - All events
Committee of Sponsoring Organizations
countermeasure
risk analysis
43. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
risk analysis
corporate security officer
performance monitor
blueprints
44. Risk mgmt method with much broader focus than IT security
Operationally Critical Threat - Asset - and Vulnerability Evaluation
AS/NZS 4360
countermeasure
COSO
45. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
mappers
No events - Errors only - Errors and warnings - All events
chief information security officer
FMEA
46. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
risk catagories
annualized rate of occurrence
threat
risk analysis
47. A weakness (software - hardware - procedural - human) that can be exploited
ISO 17799
performance monitor
ISO/IEC 27005
vulnerability
48. Potential danger to information or systems
threat
risk
penetration
technical
49. Midterm goals
tactical
AS/NZS 4360
risk analysis
CobiT
50. Corporate governance at the strategic level
vulnerability
CobiT
Committee of Sponsoring Organizations
COSO
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests