SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
ISO 17799
network mapping
exposure
OCTAVE
2. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
ISO/IEC 27002
annualized rate of occurrence
protocol analyzer
CISO
3. Type of audit that checks information classification and change control procedures
annualized loss expectancy
administrative
Information Technology Infrastructure Library (ITIL)
Committee of Sponsoring Organizations
4. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
port scanner
network mapping
risk anlysis
ISO/IEC 27001
5. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
BS7799
L0phtCrack
delayed
FRAP
6. Ensures managment security directives are fulfilled
vulnerability scanner
annualized rate of occurrence
availability
security officer
7. COSO
CISO
performance baseline
performance monitor
Committee of Sponsoring Organizations
8. The following tools (Nessus - Qualys - Retina) are ______________ scanners
CobiT
annualized loss expectancy
threat
vulnerability
9. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
vulnerability
tactical
performance baseline
CobiT
10. The asset's value multiplied by the EF percentage - (SLE)
ISO/IEC 27002
administrative
single loss expectancy
delayed
11. Number of time the incident might occur annually - (ARO)
network mapping
annualized rate of occurrence
CISO
planning horizon
12. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
annualized loss expectancy
protocol analyzer
administrative
CobiT
13. Event levels available for logging in a MS DNS server
No events - Errors only - Errors and warnings - All events
risk analysis
network mapping
mappers
14. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
No events - Errors only - Errors and warnings - All events
due care
elcomsoft
physical
15. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
operational
FMEA
CobiT
john the ripper
16. Information security managment measurements
ISO/IEC 27004
CobiT
john the ripper
strategic
17. Derived from the COSO framework
ISO/IEC 27001
Information Technology Infrastructure Library (ITIL)
L0phtCrack
CobiT
18. FRAP
OCTAVE
vulnerability
threat
Facilitated Risk Analysis Process
19. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
Information Security Management
CobiT
countermeasure
penetration
20. De facto standard of best practices for IT service mgmt
Information Technology Infrastructure Library (ITIL)
chief information security officer
network mapping
risk catagories
21. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
due care
john the ripper
privilege
ISO 17799
22. __________ loss has a negative effect after a vulnerability is initially exploited
exposure
delayed
performance baseline
performance monitor
23. SLE x ARO - (ALE)
ITIL
ISO/IEC 27004
planning horizon
annualized loss expectancy
24. A log that can record outgoing requests - incoming traffic - and internet usage
administrative
firewall
countermeasure
vulnerability
25. OCTAVE
ISO/IEC 27005
Operationally Critical Threat - Asset - and Vulnerability Evaluation
ISO/IEC 27004
due care
26. IT governance at the operational level
physical
privilege
CobiT
risk
27. Made up of ten domains - a mechanism to describe security processes
ISO 17799
risk
FRAP
security governanace
28. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
FMEA
risk anlysis
security governanace
BS7799
29. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
risk mitigation
ISO/IEC 27004
penetration
ISO 17799
30. An open language from mitre.org for determining vulnerabilities and problems on computer systems
OVAL
Facilitated Risk Analysis Process
COSO
CobiT
31. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
planning horizon
Operationally Critical Threat - Asset - and Vulnerability Evaluation
COSO
qualitative
32. Provides a cost/benefit comparision
due care
CobiT
risk analysis
security program
33. Controls that implement access control - password mangement - identification and authentication methods - configuration
ISO 17799
technical
single loss expectancy
administrative
34. Tools to ID - develop - and design security requirements for business needs
blueprints
availability
risk mitigation
protocol analyzer
35. CISO
ISO 17799
chief information security officer
corporate security officer
COSO
36. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
integrity
due care
FMEA
COSO
37. Assurance of accurancy and reliability of information and systems
integrity
security governanace
ISO/IEC 27004
escalation
38. Midterm goals
tactical
chief information security officer
Information Technology Infrastructure Library (ITIL)
physical
39. Responsible for communicating to senior mgmt organizational risks and compliance regulations
exposure
ISO/IEC 27799
CISO
vulnerability scanner
40. Guide assist in the implemenation of information security based on risk managent approach
ISO/IEC 27005
integrity
john the ripper
exposure
41. A weakness (software - hardware - procedural - human) that can be exploited
tactical
vulnerability scanner
security program
vulnerability
42. Type of audit that checks that network resources - systems and software are used appropriately
fault tree analysis
chief information security officer
Information Security Management
usage
43. CSO
CobiT
privilege
corporate security officer
exposure
44. IRM
threat
CISO
Information risk management
performance monitor
45. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
CISO
risk catagories
ISO/IEC 27002
fault tree analysis
46. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
CobiT
OVAL
ISO/IEC 27799
administrative
47. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
ISO/IEC 27001
FRAP
mappers
vulnerability
48. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
vulnerability scanner
chief information security officer
CISO
BS7799
49. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
CobiT
network mapping
data owner
Operationally Critical Threat - Asset - and Vulnerability Evaluation
50. The likelihood of exploitation and the loss potential
ISO/IEC 27004
risk analysis
risk
elcomsoft