SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. CobiT
Committee of Sponsoring Organizations
Control Objectives for Information and related Technology
OCTAVE
risk anlysis
2. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
planning horizon
risk anlysis
elcomsoft
Control Objectives for Information and related Technology
3. Used to ID failures in a complex systems to understand underlying causes of threats
countermeasure
CobiT
fault tree analysis
Information risk management
4. Made up of ten domains - a mechanism to describe security processes
COSO
FRAP
ISO 17799
risk catagories
5. OCTAVE
COSO
ISO 17799
Operationally Critical Threat - Asset - and Vulnerability Evaluation
strategic
6. Percentage of an asset's value that would be lost in a single incident - (EF)
vulnerability
CobiT
ISO/IEC 27004
exposure factor
7. Guide to illustrate how to protect personal health information
Facilitated Risk Analysis Process
ISO/IEC 27799
strategic
CobiT
8. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
Control Objectives for Information and related Technology
network mapping
vulnerability
protocol analyzer
9. Potential danger to information or systems
COSO
integrity
tactical
threat
10. COSO
fault tree analysis
risk catagories
Committee of Sponsoring Organizations
ISO/IEC 27004
11. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
FMEA
administrative
COSO
CISO
12. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
risk mitigation
performance monitor
ISO 17799
ISO/IEC 27799
13. Risk mgmt method with much broader focus than IT security
physical
AS/NZS 4360
CobiT
FMEA
14. Guide assist in the implemenation of information security based on risk managent approach
ISO/IEC 27005
Information Technology Infrastructure Library (ITIL)
annualized rate of occurrence
ISO 17799
15. Type of audit that checks information classification and change control procedures
administrative
privilege
CobiT
confidentiality
16. Type of audit that checks procedures and policies for escalating issues to management
escalation
FMEA
risk
privilege
17. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
mappers
FMEA
FRAP
annualized loss expectancy
18. Tools to ID - develop - and design security requirements for business needs
technical
exposure factor
No events - Errors only - Errors and warnings - All events
blueprints
19. Expected or predetermined performance level - developed from policy - performance - requirements
CobiT
performance baseline
annualized rate of occurrence
annualized loss expectancy
20. Possiblity of damage and the ramifications should it occur
confidentiality
risk analysis
risk
SP 800-30
21. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
risk analysis
security program
security program
BS7799
22. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
protocol analyzer
ISO 17799
availability
john the ripper
23. Type of audit that checks that network resources - systems and software are used appropriately
blueprints
planning horizon
usage
mappers
24. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
ISO/IEC 27001
Information Security Management
vulnerability
CISO
25. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
strategic
Operationally Critical Threat - Asset - and Vulnerability Evaluation
CobiT
ISO/IEC 27004
26. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
network mapping
threat
COSO
due care
27. A log that can record outgoing requests - incoming traffic - and internet usage
risk anlysis
protocol analyzer
firewall
mappers
28. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
ISO/IEC 27001
IRM
vulnerability scanner
Control Objectives for Information and related Technology
29. An open language from mitre.org for determining vulnerabilities and problems on computer systems
ISO 17799
physical
exposure factor
OVAL
30. Ensures managment security directives are fulfilled
availability
security officer
vulnerability
CISO
31. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
risk anlysis
usage
vulnerability
performance baseline
32. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
fault tree analysis
annualized rate of occurrence
vulnerability
ITIL
33. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
annualized rate of occurrence
ISO/IEC 27005
vulnerability
security program
34. A weakness (software - hardware - procedural - human) that can be exploited
vulnerability
risk
vulnerability scanner
security governanace
35. The likelihood of exploitation and the loss potential
physical
administrative
Facilitated Risk Analysis Process
risk
36. FMEA
vulnerability
elcomsoft
Failure Modes and Effect Analysis
CobiT
37. The following tools (Nessus - Qualys - Retina) are ______________ scanners
operational
Information Security Management
risk
vulnerability
38. Assurance of accurancy and reliability of information and systems
integrity
john the ripper
performance monitor
Failure Modes and Effect Analysis
39. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
physical
COSO
corporate security officer
mappers
40. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
ISO/IEC 27001
network mapping
CobiT
FMEA
41. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
Information Technology Infrastructure Library (ITIL)
penetration
FMEA
due care
42. SLE x ARO - (ALE)
IRM
annualized loss expectancy
exposure
fault tree analysis
43. Derived from the COSO framework
due care
risk
performance baseline
CobiT
44. Number of time the incident might occur annually - (ARO)
risk analysis
annualized rate of occurrence
vulnerability
threat
45. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
ISO/IEC 27005
risk analysis
john the ripper
FRAP
46. FRAP
performance baseline
Facilitated Risk Analysis Process
BS7799
Information Security Management
47. Responsible for communicating to senior mgmt organizational risks and compliance regulations
AS/NZS 4360
risk mitigation
CISO
CobiT
48. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
fault tree analysis
data owner
countermeasure
CISO
49. Daily goals focused on productivity and task-oriented activities
elcomsoft
operational
corporate security officer
exposure
50. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
physical
Facilitated Risk Analysis Process
risk
BS7799