SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Midterm goals
Information Security Management
confidentiality
administrative
tactical
2. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
CobiT
exposure
physical
vulnerability
3. Derived from the COSO framework
vulnerability
CobiT
single loss expectancy
performance baseline
4. Guide assist in the implemenation of information security based on risk managent approach
performance baseline
ISO/IEC 27005
operational
Failure Modes and Effect Analysis
5. Type of audit that checks that accounts - groups and roles are correctly assigned
ISO/IEC 27001
threat
ISO 17799
privilege
6. An open language from mitre.org for determining vulnerabilities and problems on computer systems
CobiT
OVAL
corporate security officer
annualized loss expectancy
7. The tools - personnel and business processes necessary to ensure that security meets needs
CISO
security governanace
risk anlysis
performance baseline
8. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
Control Objectives for Information and related Technology
qualitative
COSO
penetration
9. IRM
Information risk management
risk anlysis
tactical
Information Security Management
10. A weakness (software - hardware - procedural - human) that can be exploited
annualized rate of occurrence
port scanner
vulnerability
AS/NZS 4360
11. IT governance at the operational level
Facilitated Risk Analysis Process
CobiT
physical
L0phtCrack
12. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
annualized rate of occurrence
escalation
security program
due care
13. Ensures reliable timely access to data/resources to authorized individuals
OVAL
availability
Committee of Sponsoring Organizations
strategic
14. Event levels available for logging in a MS DNS server
FRAP
physical
L0phtCrack
No events - Errors only - Errors and warnings - All events
15. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
strategic
COSO
risk
port scanner
16. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
vulnerability
administrative
security officer
Failure Modes and Effect Analysis
17. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
Operationally Critical Threat - Asset - and Vulnerability Evaluation
risk anlysis
john the ripper
FMEA
18. Assurance of accurancy and reliability of information and systems
usage
single loss expectancy
integrity
ISO 17799
19. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
security program
ISO/IEC 27004
risk analysis
OCTAVE
20. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
usage
risk analysis
Information Security Management
risk mitigation
21. Made up of ten domains - a mechanism to describe security processes
network mapping
ISO 17799
risk analysis
integrity
22. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
network mapping
FRAP
SP 800-30
risk
23. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
Control Objectives for Information and related Technology
vulnerability
port scanner
IRM
24. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
OVAL
No events - Errors only - Errors and warnings - All events
risk mitigation
administrative
25. Daily goals focused on productivity and task-oriented activities
operational
vulnerability
FMEA
risk
26. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
escalation
vulnerability scanner
ISO 17799
fault tree analysis
27. Expected or predetermined performance level - developed from policy - performance - requirements
physical
performance baseline
network mapping
No events - Errors only - Errors and warnings - All events
28. Tools to ID - develop - and design security requirements for business needs
vulnerability
blueprints
FMEA
CISO
29. Percentage of an asset's value that would be lost in a single incident - (EF)
corporate security officer
exposure factor
threat
CobiT
30. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
CISO
network mapping
COSO
risk analysis
31. Used to ID failures in a complex systems to understand underlying causes of threats
fault tree analysis
Committee of Sponsoring Organizations
CISO
Control Objectives for Information and related Technology
32. Ensures managment security directives are fulfilled
privilege
security officer
Facilitated Risk Analysis Process
security program
33. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
data owner
Information Technology Infrastructure Library (ITIL)
protocol analyzer
usage
34. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
elcomsoft
risk catagories
ISO/IEC 27001
L0phtCrack
35. CobiT
Control Objectives for Information and related Technology
CobiT
CobiT
CISO
36. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
CobiT
CISO
ISO/IEC 27799
tactical
37. __________ loss has a negative effect after a vulnerability is initially exploited
elcomsoft
delayed
operational
risk mitigation
38. De facto standard of best practices for IT service mgmt
ISO 17799
FMEA
COSO
Information Technology Infrastructure Library (ITIL)
39. Focus on service level agreements between IT dept and internal customers
exposure factor
ITIL
qualitative
john the ripper
40. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
security governanace
risk analysis
mappers
network mapping
41. Ensures necessary level of secrecy and prevents unauthorized disclosure
confidentiality
L0phtCrack
operational
Control Objectives for Information and related Technology
42. OCTAVE
risk
escalation
Operationally Critical Threat - Asset - and Vulnerability Evaluation
performance baseline
43. Type of audit that checks information classification and change control procedures
administrative
due care
fault tree analysis
ISO/IEC 27002
44. The likelihood of exploitation and the loss potential
privilege
risk
port scanner
performance monitor
45. The asset's value multiplied by the EF percentage - (SLE)
single loss expectancy
due care
Control Objectives for Information and related Technology
OVAL
46. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
performance baseline
COSO
integrity
qualitative
47. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
ISO/IEC 27002
IRM
Facilitated Risk Analysis Process
Committee of Sponsoring Organizations
48. Responsible for communicating to senior mgmt organizational risks and compliance regulations
protocol analyzer
CISO
ISO/IEC 27002
physical
49. Type of audit that checks that network resources - systems and software are used appropriately
usage
CISO
confidentiality
SP 800-30
50. NIST risk management methodology
SP 800-30
BS7799
technical
exposure