SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
john the ripper
confidentiality
ISO/IEC 27004
due care
2. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
network mapping
confidentiality
planning horizon
protocol analyzer
3. Daily goals focused on productivity and task-oriented activities
operational
administrative
performance monitor
AS/NZS 4360
4. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
port scanner
security program
network mapping
ISO/IEC 27002
5. Made up of ten domains - a mechanism to describe security processes
FMEA
planning horizon
Committee of Sponsoring Organizations
ISO 17799
6. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
AS/NZS 4360
CobiT
FMEA
risk analysis
7. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
risk analysis
operational
vulnerability
confidentiality
8. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
vulnerability
BS7799
Information Technology Infrastructure Library (ITIL)
exposure
9. __________ loss has a negative effect after a vulnerability is initially exploited
integrity
delayed
availability
Operationally Critical Threat - Asset - and Vulnerability Evaluation
10. SLE x ARO - (ALE)
annualized loss expectancy
escalation
chief information security officer
exposure
11. Number of time the incident might occur annually - (ARO)
exposure factor
annualized rate of occurrence
risk catagories
penetration
12. Percentage of an asset's value that would be lost in a single incident - (EF)
Information Security Management
exposure factor
security governanace
ISO/IEC 27005
13. NIST risk management methodology
Information risk management
SP 800-30
ISO/IEC 27001
security officer
14. Type of audit that checks procedures and policies for escalating issues to management
escalation
john the ripper
Control Objectives for Information and related Technology
annualized loss expectancy
15. COSO
delayed
OCTAVE
Committee of Sponsoring Organizations
annualized rate of occurrence
16. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
integrity
risk catagories
vulnerability scanner
FRAP
17. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
escalation
CobiT
ISO/IEC 27799
ISO/IEC 27002
18. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
risk
risk analysis
data owner
CobiT
19. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
CISO
risk mitigation
qualitative
elcomsoft
20. Type of audit that checks that accounts - groups and roles are correctly assigned
FRAP
OCTAVE
vulnerability
privilege
21. CobiT
Information Technology Infrastructure Library (ITIL)
strategic
Control Objectives for Information and related Technology
ISO 17799
22. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
CobiT
OCTAVE
john the ripper
BS7799
23. Ensures reliable timely access to data/resources to authorized individuals
risk catagories
vulnerability
availability
corporate security officer
24. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
confidentiality
COSO
AS/NZS 4360
planning horizon
25. OCTAVE
Failure Modes and Effect Analysis
performance baseline
technical
Operationally Critical Threat - Asset - and Vulnerability Evaluation
26. Mitigates a potential risk
OCTAVE
countermeasure
Failure Modes and Effect Analysis
elcomsoft
27. Risk mgmt method with much broader focus than IT security
threat
performance baseline
strategic
AS/NZS 4360
28. The likelihood of exploitation and the loss potential
annualized loss expectancy
FMEA
risk mitigation
risk
29. Strategic - tactical and operational planning
single loss expectancy
FMEA
planning horizon
performance baseline
30. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
elcomsoft
ISO/IEC 27002
protocol analyzer
COSO
31. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
corporate security officer
administrative
qualitative
BS7799
32. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
Operationally Critical Threat - Asset - and Vulnerability Evaluation
FMEA
ISO/IEC 27005
performance monitor
33. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
john the ripper
protocol analyzer
confidentiality
Information Security Management
34. The following tools (Nessus - Qualys - Retina) are ______________ scanners
integrity
vulnerability
mappers
risk
35. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
threat
planning horizon
COSO
IRM
36. Tools to ID - develop - and design security requirements for business needs
security program
security officer
blueprints
network mapping
37. FRAP
CobiT
exposure factor
Facilitated Risk Analysis Process
COSO
38. Type of audit that checks that network resources - systems and software are used appropriately
performance monitor
usage
tactical
protocol analyzer
39. Derived from the COSO framework
risk anlysis
FMEA
vulnerability
CobiT
40. ISM Standard
CISO
IRM
Committee of Sponsoring Organizations
Information Security Management
41. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
risk
FMEA
ISO/IEC 27799
ISO 17799
42. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
fault tree analysis
Facilitated Risk Analysis Process
L0phtCrack
strategic
43. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
privilege
FRAP
network mapping
chief information security officer
44. Midterm goals
vulnerability
technical
Control Objectives for Information and related Technology
tactical
45. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
delayed
vulnerability scanner
tactical
FMEA
46. An instance of being exposed to losses from a threat
exposure
ISO/IEC 27001
ISO/IEC 27004
strategic
47. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
security program
No events - Errors only - Errors and warnings - All events
administrative
network mapping
48. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
qualitative
ISO/IEC 27001
CobiT
L0phtCrack
49. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
ISO 17799
BS7799
risk analysis
Control Objectives for Information and related Technology
50. De facto standard of best practices for IT service mgmt
administrative
Information Technology Infrastructure Library (ITIL)
exposure
CobiT