SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Event levels available for logging in a MS DNS server
physical
CobiT
AS/NZS 4360
No events - Errors only - Errors and warnings - All events
2. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
vulnerability
physical
FRAP
operational
3. Number of time the incident might occur annually - (ARO)
annualized rate of occurrence
threat
Control Objectives for Information and related Technology
CISO
4. An open language from mitre.org for determining vulnerabilities and problems on computer systems
performance monitor
physical
penetration
OVAL
5. CISO
No events - Errors only - Errors and warnings - All events
COSO
CobiT
chief information security officer
6. Plan and Organize - Acquire and Implement - Deliver and Support - Monitor and Evaluate
penetration
CobiT
corporate security officer
fault tree analysis
7. This type of testing scans for vulnerabilities - attacks to determine extent - tests countermeasures by circumvention - and can be internal or external
BS7799
Failure Modes and Effect Analysis
penetration
CISO
8. Responsible for information classification and protection
data owner
strategic
chief information security officer
ITIL
9. FMEA
risk analysis
firewall
AS/NZS 4360
Failure Modes and Effect Analysis
10. Expected or predetermined performance level - developed from policy - performance - requirements
annualized loss expectancy
single loss expectancy
IRM
performance baseline
11. FRAP
due care
ISO/IEC 27004
OCTAVE
Facilitated Risk Analysis Process
12. SLE x ARO - (ALE)
BS7799
annualized loss expectancy
network mapping
risk
13. Guide to illustrate how to protect personal health information
integrity
planning horizon
corporate security officer
ISO/IEC 27799
14. NIST risk management methodology
Information risk management
administrative
CISO
SP 800-30
15. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
administrative
strategic
mappers
ISO/IEC 27001
16. Possiblity of damage and the ramifications should it occur
risk analysis
threat
risk
penetration
17. OCTAVE
delayed
Operationally Critical Threat - Asset - and Vulnerability Evaluation
CobiT
vulnerability scanner
18. Percentage of an asset's value that would be lost in a single incident - (EF)
performance baseline
exposure factor
COSO
CobiT
19. Controls that include policies - standards - procedures -risk management - personnel screening - training - change control
blueprints
performance baseline
administrative
firewall
20. Ensures reliable timely access to data/resources to authorized individuals
availability
chief information security officer
confidentiality
COSO
21. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
escalation
blueprints
tactical
FMEA
22. CobiT
CobiT
COSO
threat
Control Objectives for Information and related Technology
23. Type of audit that checks that accounts - groups and roles are correctly assigned
BS7799
annualized rate of occurrence
privilege
Information risk management
24. Derived from the COSO framework
CISO
corporate security officer
COSO
CobiT
25. Potential danger to information or systems
threat
BS7799
Information risk management
FMEA
26. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
ISO/IEC 27005
vulnerability
Information Technology Infrastructure Library (ITIL)
ISO 17799
27. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
risk mitigation
vulnerability
L0phtCrack
ITIL
28. The tools - personnel and business processes necessary to ensure that security meets needs
security governanace
ISO/IEC 27799
risk analysis
john the ripper
29. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
BS7799
L0phtCrack
vulnerability
corporate security officer
30. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
Facilitated Risk Analysis Process
OCTAVE
security program
countermeasure
31. The following tools (Nessus - Qualys - Retina) are ______________ scanners
ITIL
chief information security officer
vulnerability
BS7799
32. Risk mgmt method with much broader focus than IT security
AS/NZS 4360
COSO
administrative
ISO 17799
33. The likelihood of exploitation and the loss potential
integrity
risk
vulnerability scanner
annualized rate of occurrence
34. Provides a cost/benefit comparision
risk anlysis
risk analysis
CobiT
penetration
35. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
CobiT
ISO/IEC 27001
delayed
firewall
36. Risk assessment that is scenario based - ranks threats and countermeasures - uses experience - judgment - intuition and opinion
OVAL
risk mitigation
qualitative
single loss expectancy
37. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
protocol analyzer
AS/NZS 4360
Information risk management
vulnerability scanner
38. ISM Standard
Information Security Management
threat
due care
data owner
39. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
ISO/IEC 27005
IRM
Committee of Sponsoring Organizations
protocol analyzer
40. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
elcomsoft
FMEA
risk anlysis
Committee of Sponsoring Organizations
41. Responsible for communicating to senior mgmt organizational risks and compliance regulations
CISO
risk catagories
due care
security officer
42. Mitigates a potential risk
ISO/IEC 27004
CobiT
OCTAVE
countermeasure
43. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
privilege
risk catagories
security program
planning horizon
44. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
ISO/IEC 27001
BS7799
confidentiality
risk
45. Type of audit that checks information classification and change control procedures
strategic
tactical
physical
administrative
46. Daily goals focused on productivity and task-oriented activities
ISO/IEC 27799
Control Objectives for Information and related Technology
operational
exposure
47. Type of audit that checks that network resources - systems and software are used appropriately
Facilitated Risk Analysis Process
usage
threat
risk mitigation
48. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
performance monitor
FRAP
usage
strategic
49. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
risk
planning horizon
ISO/IEC 27005
risk mitigation
50. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
confidentiality
Information risk management
due care
ISO 17799