SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
risk mitigation
qualitative
performance monitor
elcomsoft
2. Collection of controls an organization must have in place
security program
exposure
annualized rate of occurrence
BS7799
3. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
AS/NZS 4360
ISO 17799
penetration
due care
4. Responsible for communicating to senior mgmt organizational risks and compliance regulations
protocol analyzer
exposure
CISO
delayed
5. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
due care
physical
network mapping
risk analysis
6. Guide to illustrate how to protect personal health information
privilege
tactical
technical
ISO/IEC 27799
7. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
risk catagories
CISO
availability
ISO/IEC 27799
8. Guide assist in the implemenation of information security based on risk managent approach
security governanace
data owner
ISO/IEC 27005
FRAP
9. Midterm goals
BS7799
tactical
risk analysis
Control Objectives for Information and related Technology
10. Information security managment measurements
ISO/IEC 27004
performance monitor
ISO/IEC 27002
CISO
11. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
ISO/IEC 27005
penetration
AS/NZS 4360
vulnerability scanner
12. The following tools (Nessus - Qualys - Retina) are ______________ scanners
vulnerability
countermeasure
CISO
exposure factor
13. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
Failure Modes and Effect Analysis
BS7799
Information risk management
strategic
14. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
OVAL
annualized rate of occurrence
chief information security officer
CISO
15. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
single loss expectancy
risk analysis
ISO 17799
ISO/IEC 27002
16. __________ loss has a negative effect after a vulnerability is initially exploited
availability
FMEA
delayed
vulnerability
17. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
planning horizon
physical
L0phtCrack
No events - Errors only - Errors and warnings - All events
18. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
vulnerability
network mapping
administrative
security program
19. Made up of ten domains - a mechanism to describe security processes
COSO
COSO
ISO 17799
AS/NZS 4360
20. Used to ID failures in a complex systems to understand underlying causes of threats
firewall
Control Objectives for Information and related Technology
fault tree analysis
data owner
21. Controls that implement access control - password mangement - identification and authentication methods - configuration
ITIL
technical
planning horizon
corporate security officer
22. Type of audit that checks information classification and change control procedures
john the ripper
ISO/IEC 27001
firewall
administrative
23. ISM Standard
security program
Information Security Management
CobiT
vulnerability
24. A weakness (software - hardware - procedural - human) that can be exploited
CobiT
vulnerability
risk analysis
planning horizon
25. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
Information Security Management
risk analysis
integrity
BS7799
26. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
Failure Modes and Effect Analysis
john the ripper
risk mitigation
annualized rate of occurrence
27. IT governance at the operational level
escalation
ISO/IEC 27002
CobiT
privilege
28. Ensures reliable timely access to data/resources to authorized individuals
availability
operational
Committee of Sponsoring Organizations
FMEA
29. CSO
Facilitated Risk Analysis Process
physical
ISO/IEC 27001
corporate security officer
30. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
CobiT
FMEA
Operationally Critical Threat - Asset - and Vulnerability Evaluation
physical
31. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
qualitative
ISO/IEC 27799
administrative
IRM
32. Type of audit that checks that network resources - systems and software are used appropriately
security program
No events - Errors only - Errors and warnings - All events
usage
Information risk management
33. Responsible for information classification and protection
vulnerability scanner
ISO 17799
annualized rate of occurrence
data owner
34. Possiblity of damage and the ramifications should it occur
operational
due care
risk anlysis
risk
35. Percentage of an asset's value that would be lost in a single incident - (EF)
exposure factor
escalation
risk analysis
Facilitated Risk Analysis Process
36. Strategic - tactical and operational planning
planning horizon
administrative
risk
OCTAVE
37. The likelihood of exploitation and the loss potential
Information risk management
risk
single loss expectancy
data owner
38. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
Control Objectives for Information and related Technology
CobiT
vulnerability
FRAP
39. CISO
ISO/IEC 27001
risk anlysis
chief information security officer
integrity
40. An instance of being exposed to losses from a threat
countermeasure
exposure
qualitative
risk
41. Derived from the COSO framework
OCTAVE
CobiT
IRM
planning horizon
42. Potential danger to information or systems
threat
ISO/IEC 27799
vulnerability scanner
Information risk management
43. Type of audit that checks procedures and policies for escalating issues to management
FMEA
security governanace
OCTAVE
escalation
44. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
protocol analyzer
security program
firewall
penetration
45. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
network mapping
IRM
john the ripper
ISO/IEC 27005
46. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
FMEA
planning horizon
network mapping
L0phtCrack
47. Number of time the incident might occur annually - (ARO)
Control Objectives for Information and related Technology
usage
privilege
annualized rate of occurrence
48. Event levels available for logging in a MS DNS server
tactical
administrative
No events - Errors only - Errors and warnings - All events
COSO
49. IRM
penetration
Information risk management
privilege
blueprints
50. COSO
COSO
ISO/IEC 27002
Committee of Sponsoring Organizations
tactical