SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. SLE x ARO - (ALE)
performance monitor
IRM
annualized loss expectancy
protocol analyzer
2. Derived from the COSO framework
qualitative
Failure Modes and Effect Analysis
IRM
CobiT
3. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
risk analysis
firewall
risk catagories
risk
4. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
IRM
security program
delayed
security governanace
5. A weakness (software - hardware - procedural - human) that can be exploited
risk analysis
vulnerability
risk anlysis
AS/NZS 4360
6. Risk mgmt method with much broader focus than IT security
Operationally Critical Threat - Asset - and Vulnerability Evaluation
AS/NZS 4360
ISO/IEC 27799
administrative
7. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
ISO 17799
CobiT
performance baseline
blueprints
8. NIST risk management methodology
IRM
risk catagories
performance baseline
SP 800-30
9. Percentage of an asset's value that would be lost in a single incident - (EF)
FRAP
Information Technology Infrastructure Library (ITIL)
exposure factor
threat
10. COSO
escalation
administrative
john the ripper
Committee of Sponsoring Organizations
11. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
ISO/IEC 27799
network mapping
qualitative
FMEA
12. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
risk mitigation
risk analysis
FMEA
IRM
13. The likelihood of exploitation and the loss potential
ISO/IEC 27005
risk
SP 800-30
mappers
14. Guide assist in the implemenation of information security based on risk managent approach
CobiT
ISO/IEC 27005
privilege
FRAP
15. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
usage
tactical
john the ripper
ISO/IEC 27002
16. Guide to illustrate how to protect personal health information
No events - Errors only - Errors and warnings - All events
ISO/IEC 27799
exposure factor
availability
17. Daily goals focused on productivity and task-oriented activities
threat
operational
ITIL
integrity
18. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
COSO
delayed
john the ripper
usage
19. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
escalation
OCTAVE
Operationally Critical Threat - Asset - and Vulnerability Evaluation
No events - Errors only - Errors and warnings - All events
20. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
vulnerability scanner
strategic
technical
COSO
21. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
CobiT
vulnerability scanner
due care
CISO
22. Potential danger to information or systems
security program
OCTAVE
CISO
threat
23. Made up of ten domains - a mechanism to describe security processes
ISO/IEC 27799
privilege
FRAP
ISO 17799
24. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
BS7799
qualitative
COSO
ISO/IEC 27004
25. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
Facilitated Risk Analysis Process
exposure
risk analysis
L0phtCrack
26. FMEA
Failure Modes and Effect Analysis
risk mitigation
john the ripper
CobiT
27. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
OVAL
AS/NZS 4360
risk catagories
strategic
28. ISM Standard
ISO/IEC 27799
administrative
Information Security Management
network mapping
29. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
physical
Information Security Management
escalation
SP 800-30
30. Ensures necessary level of secrecy and prevents unauthorized disclosure
planning horizon
annualized loss expectancy
privilege
confidentiality
31. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
performance baseline
network mapping
risk
john the ripper
32. Provides a cost/benefit comparision
vulnerability
privilege
risk analysis
planning horizon
33. Ensures reliable timely access to data/resources to authorized individuals
confidentiality
risk mitigation
usage
availability
34. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
risk
mappers
Information risk management
SP 800-30
35. Mitigates a potential risk
blueprints
countermeasure
planning horizon
Control Objectives for Information and related Technology
36. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
CobiT
usage
CISO
security governanace
37. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
BS7799
COSO
mappers
vulnerability
38. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
ISO/IEC 27001
protocol analyzer
ISO 17799
annualized rate of occurrence
39. Type of audit that checks that accounts - groups and roles are correctly assigned
risk catagories
risk
annualized loss expectancy
privilege
40. Responsible for information classification and protection
usage
ITIL
ISO/IEC 27004
data owner
41. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
CobiT
risk mitigation
network mapping
ISO/IEC 27001
42. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
ISO 17799
FRAP
exposure factor
strategic
43. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
planning horizon
performance monitor
SP 800-30
elcomsoft
44. Event levels available for logging in a MS DNS server
No events - Errors only - Errors and warnings - All events
risk
due care
Control Objectives for Information and related Technology
45. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
Operationally Critical Threat - Asset - and Vulnerability Evaluation
strategic
Failure Modes and Effect Analysis
FMEA
46. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
risk catagories
data owner
CobiT
risk mitigation
47. Tools to ID - develop - and design security requirements for business needs
blueprints
IRM
penetration
annualized loss expectancy
48. Information security managment measurements
chief information security officer
operational
ISO/IEC 27004
risk analysis
49. CISO
vulnerability scanner
chief information security officer
protocol analyzer
exposure
50. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
exposure factor
security program
protocol analyzer
CISO