SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IT governance at the operational level
network mapping
ISO/IEC 27001
CobiT
availability
2. Number of time the incident might occur annually - (ARO)
annualized rate of occurrence
technical
operational
vulnerability scanner
3. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
administrative
john the ripper
CobiT
qualitative
4. CobiT
Control Objectives for Information and related Technology
security program
administrative
ISO/IEC 27002
5. OCTAVE
ITIL
countermeasure
Operationally Critical Threat - Asset - and Vulnerability Evaluation
CISO
6. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
OVAL
performance monitor
Information risk management
vulnerability scanner
7. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
security governanace
network mapping
OVAL
BS7799
8. ISM Standard
Committee of Sponsoring Organizations
Information Security Management
ISO/IEC 27799
network mapping
9. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
Facilitated Risk Analysis Process
availability
Information Technology Infrastructure Library (ITIL)
risk analysis
10. Corporate governance at the strategic level
Control Objectives for Information and related Technology
COSO
CISO
CISO
11. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
ISO/IEC 27005
qualitative
vulnerability
AS/NZS 4360
12. An open language from mitre.org for determining vulnerabilities and problems on computer systems
ISO 17799
escalation
OVAL
security program
13. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
CISO
Information risk management
integrity
vulnerability scanner
14. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
BS7799
firewall
OCTAVE
IRM
15. Responsible for information classification and protection
COSO
ISO 17799
ISO/IEC 27002
data owner
16. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
security governanace
vulnerability scanner
mappers
corporate security officer
17. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
vulnerability
usage
ISO 17799
elcomsoft
18. Responsible for communicating to senior mgmt organizational risks and compliance regulations
vulnerability scanner
SP 800-30
physical
CISO
19. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
risk anlysis
Information Security Management
vulnerability
firewall
20. __________ loss has a negative effect after a vulnerability is initially exploited
delayed
single loss expectancy
operational
planning horizon
21. Information security managment measurements
ISO/IEC 27004
security governanace
strategic
CobiT
22. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
tactical
FMEA
vulnerability scanner
Information risk management
23. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
SP 800-30
Information Technology Infrastructure Library (ITIL)
CobiT
due care
24. De facto standard of best practices for IT service mgmt
Information Technology Infrastructure Library (ITIL)
risk
ISO/IEC 27799
operational
25. Controls that implement access control - password mangement - identification and authentication methods - configuration
technical
FRAP
escalation
ISO 17799
26. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
operational
tactical
qualitative
due care
27. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
protocol analyzer
CobiT
network mapping
qualitative
28. CISO
annualized rate of occurrence
SP 800-30
chief information security officer
risk catagories
29. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
security program
john the ripper
Operationally Critical Threat - Asset - and Vulnerability Evaluation
ISO 17799
30. COSO
john the ripper
COSO
Committee of Sponsoring Organizations
privilege
31. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
protocol analyzer
tactical
ISO 17799
CobiT
32. Event levels available for logging in a MS DNS server
OCTAVE
risk
No events - Errors only - Errors and warnings - All events
exposure factor
33. Ensures necessary level of secrecy and prevents unauthorized disclosure
delayed
security officer
risk
confidentiality
34. SLE x ARO - (ALE)
ISO/IEC 27001
technical
ISO/IEC 27005
annualized loss expectancy
35. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
security program
risk mitigation
CobiT
BS7799
36. Potential danger to information or systems
tactical
data owner
OCTAVE
threat
37. Type of audit that checks that accounts - groups and roles are correctly assigned
single loss expectancy
vulnerability scanner
privilege
ISO/IEC 27004
38. Possiblity of damage and the ramifications should it occur
corporate security officer
CobiT
annualized rate of occurrence
risk
39. Expected or predetermined performance level - developed from policy - performance - requirements
performance baseline
SP 800-30
COSO
No events - Errors only - Errors and warnings - All events
40. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
john the ripper
confidentiality
risk mitigation
Control Objectives for Information and related Technology
41. Assurance of accurancy and reliability of information and systems
integrity
availability
threat
operational
42. A log that can record outgoing requests - incoming traffic - and internet usage
administrative
firewall
CISO
Committee of Sponsoring Organizations
43. A weakness (software - hardware - procedural - human) that can be exploited
penetration
vulnerability
security governanace
countermeasure
44. The asset's value multiplied by the EF percentage - (SLE)
administrative
vulnerability
single loss expectancy
vulnerability
45. Type of audit that checks information classification and change control procedures
L0phtCrack
IRM
countermeasure
administrative
46. Tools to ID - develop - and design security requirements for business needs
fault tree analysis
COSO
blueprints
Failure Modes and Effect Analysis
47. Midterm goals
tactical
annualized rate of occurrence
security program
availability
48. IRM
physical
port scanner
Information risk management
risk anlysis
49. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
risk mitigation
OCTAVE
delayed
security governanace
50. Percentage of an asset's value that would be lost in a single incident - (EF)
vulnerability
network mapping
exposure factor
OCTAVE