SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Ensures reliable timely access to data/resources to authorized individuals
BS7799
fault tree analysis
Control Objectives for Information and related Technology
availability
2. Internationally recognized Information Security Management standard - provides high level conceptual recomendations on enterprise security - brish standard
blueprints
BS7799
usage
AS/NZS 4360
3. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
FRAP
network mapping
single loss expectancy
security program
4. Corporate governance at the strategic level
integrity
COSO
Information Security Management
No events - Errors only - Errors and warnings - All events
5. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
vulnerability
administrative
fault tree analysis
COSO
6. Guide to illustrate how to protect personal health information
security program
FMEA
ISO/IEC 27799
ITIL
7. ____________ can discover network devices / application - check password strength - measure internal / external access - analyze vulnerabilities in NOS - test response to DOS attacks
john the ripper
risk anlysis
network mapping
usage
8. A log that can record outgoing requests - incoming traffic - and internet usage
availability
FMEA
ISO 17799
firewall
9. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
ISO 17799
CobiT
Information risk management
vulnerability
10. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
vulnerability
integrity
mappers
risk catagories
11. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
confidentiality
Facilitated Risk Analysis Process
L0phtCrack
john the ripper
12. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
annualized rate of occurrence
strategic
risk analysis
firewall
13. Tools to ID - develop - and design security requirements for business needs
data owner
blueprints
COSO
penetration
14. Mitigates a potential risk
COSO
privilege
OCTAVE
countermeasure
15. Percentage of an asset's value that would be lost in a single incident - (EF)
exposure factor
ITIL
countermeasure
elcomsoft
16. A commercial password cracker that can test password strength and recover passwords; and perform dictionary and brute force attacks
CobiT
Failure Modes and Effect Analysis
threat
elcomsoft
17. A tool that maps weaknesses of systems / networks by scanning for ports - checking for applications - determining OS and patch level - and attempting exploits
vulnerability scanner
threat
Information risk management
countermeasure
18. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
FRAP
security governanace
network mapping
L0phtCrack
19. Method of ID functions and their failures - causes of failures their effect - originally designed for systems engineering
ISO/IEC 27799
OVAL
FRAP
FMEA
20. ISM Standard
corporate security officer
ISO/IEC 27004
IRM
Information Security Management
21. Control environment - company culture - Risk assessment - manage change - Control activities - policies - procedures - practices - Information and communication - right people - info - time - Monitoring - detect and respond
COSO
OVAL
ISO/IEC 27001
usage
22. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
Information risk management
ISO 17799
john the ripper
FRAP
23. An instance of being exposed to losses from a threat
exposure
Control Objectives for Information and related Technology
vulnerability
COSO
24. Information security managment measurements
ISO/IEC 27004
physical
OCTAVE
IRM
25. Expected or predetermined performance level - developed from policy - performance - requirements
performance baseline
Failure Modes and Effect Analysis
security program
strategic
26. De facto standard of best practices for IT service mgmt
security program
Information Technology Infrastructure Library (ITIL)
BS7799
risk catagories
27. FMEA
security governanace
Failure Modes and Effect Analysis
No events - Errors only - Errors and warnings - All events
risk analysis
28. Possiblity of damage and the ramifications should it occur
Information Security Management
Committee of Sponsoring Organizations
risk
COSO
29. Provides a cost/benefit comparision
technical
protocol analyzer
IRM
risk analysis
30. This tool scans network devices listening for open ports - (i.e. Nmap - scanmetender - superscan - NHS nohack scanner)
risk
countermeasure
port scanner
vulnerability
31. Ensures necessary level of secrecy and prevents unauthorized disclosure
CISO
blueprints
security governanace
confidentiality
32. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
security officer
risk analysis
Information Security Management
IRM
33. Ensures managment security directives are fulfilled
Control Objectives for Information and related Technology
SP 800-30
security officer
Information Technology Infrastructure Library (ITIL)
34. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
vulnerability
risk anlysis
protocol analyzer
data owner
35. __________ loss has a negative effect after a vulnerability is initially exploited
delayed
mappers
fault tree analysis
firewall
36. Event levels available for logging in a MS DNS server
No events - Errors only - Errors and warnings - All events
ISO/IEC 27001
operational
elcomsoft
37. Type of audit that checks that accounts - groups and roles are correctly assigned
threat
Facilitated Risk Analysis Process
privilege
vulnerability
38. NIST risk management methodology
annualized loss expectancy
SP 800-30
ISO/IEC 27001
risk mitigation
39. Risk mgmt method created by Carnegie Mellon University - people manage/direct the risk evaluation for IT security in a company
integrity
OCTAVE
OVAL
single loss expectancy
40. A process to ID assests and their value - ID vulnerabilities and threats - quantify probability and impact of threats - provide balance between impact and cost
risk anlysis
IRM
john the ripper
OCTAVE
41. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
ISO/IEC 27001
network mapping
due care
Control Objectives for Information and related Technology
42. Type of audit that checks procedures and policies for escalating issues to management
technical
escalation
port scanner
CobiT
43. CobiT
usage
ISO/IEC 27002
Control Objectives for Information and related Technology
threat
44. Type of audit that checks that network resources - systems and software are used appropriately
vulnerability
delayed
CobiT
usage
45. CISO
No events - Errors only - Errors and warnings - All events
operational
protocol analyzer
chief information security officer
46. Risk mgmt method with much broader focus than IT security
performance monitor
AS/NZS 4360
Operationally Critical Threat - Asset - and Vulnerability Evaluation
threat
47. Developed by the Treadway Commission in 1985 to deal with fraudulent financial activities and reporting
technical
COSO
risk analysis
performance monitor
48. Controls that implement access control - password mangement - identification and authentication methods - configuration
availability
port scanner
technical
BS7799
49. Derived from the COSO framework
CobiT
risk anlysis
risk analysis
annualized loss expectancy
50. Plan and Organize - Implement - Operate and Maintain - Monitor and Evaluate
CISO
security program
CobiT
countermeasure