SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Assessment And Risk Mgmt
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A log that can record outgoing requests - incoming traffic - and internet usage
firewall
single loss expectancy
Control Objectives for Information and related Technology
vulnerability scanner
2. Percentage of an asset's value that would be lost in a single incident - (EF)
exposure factor
CISO
exposure
Control Objectives for Information and related Technology
3. Expected or predetermined performance level - developed from policy - performance - requirements
due care
performance baseline
corporate security officer
Information Technology Infrastructure Library (ITIL)
4. Framework/set of best practices that define goals for controls used to properly manage IT and to ensure IT maps to business needs
security officer
COSO
CobiT
elcomsoft
5. Controls that manage facility access - locking systems - media sanitation - intrusion monitoring - environmental
firewall
physical
FMEA
risk anlysis
6. Responsible for information classification and protection
elcomsoft
data owner
Committee of Sponsoring Organizations
network mapping
7. Type of audit that checks that accounts - groups and roles are correctly assigned
FMEA
escalation
privilege
CISO
8. Focus on service level agreements between IT dept and internal customers
CobiT
security governanace
ITIL
annualized rate of occurrence
9. An open language from mitre.org for determining vulnerabilities and problems on computer systems
OVAL
administrative
FRAP
risk mitigation
10. IT governance at the operational level
CobiT
FMEA
OCTAVE
Operationally Critical Threat - Asset - and Vulnerability Evaluation
11. De facto standard of best practices for IT service mgmt
physical
FMEA
risk
Information Technology Infrastructure Library (ITIL)
12. The tools - personnel and business processes necessary to ensure that security meets needs
risk mitigation
tactical
security governanace
single loss expectancy
13. Responsible for developing: security awareness program - budget for information security related activities; policies - procdures - and guidelines - a security compliance program - and metrics
blueprints
CISO
vulnerability
FMEA
14. NIST risk management methodology
john the ripper
SP 800-30
risk mitigation
confidentiality
15. Port scanners - vulnerability scanners - protocol analyzers - password crackers - network mappers - open vulnerability and assessment language (OVAL) are all tool used in a ___________________ assessment
annualized rate of occurrence
vulnerability
blueprints
Information Technology Infrastructure Library (ITIL)
16. Risk mgmt method with much broader focus than IT security
physical
ISO 17799
risk analysis
AS/NZS 4360
17. Hp OpenView - Nmap - Qualys - Solana Networks - SolarWinds are all network _____________
annualized loss expectancy
mappers
network mapping
administrative
18. OCTAVE
Operationally Critical Threat - Asset - and Vulnerability Evaluation
CobiT
security governanace
technical
19. Possiblity of damage and the ramifications should it occur
FMEA
risk
protocol analyzer
john the ripper
20. Process of ID and assessing risk - reducing to acceptable level - implementing mechanisms to maintain.
tactical
john the ripper
L0phtCrack
IRM
21. Information security managment measurements
data owner
ISO/IEC 27004
annualized loss expectancy
SP 800-30
22. Controls that implement access control - password mangement - identification and authentication methods - configuration
physical
administrative
technical
protocol analyzer
23. Legal term used to determine liability - acting responsibly - have lower risk of liability due to security breach
protocol analyzer
due care
CISO
penetration
24. Responsible for communicating to senior mgmt organizational risks and compliance regulations
ISO/IEC 27799
escalation
CISO
OCTAVE
25. Long-term goals focused on risk managment - compliance - security responsiblities - continual improvement - using security to attract customers
strategic
Committee of Sponsoring Organizations
ISO 17799
Information Security Management
26. An instance of being exposed to losses from a threat
exposure
availability
strategic
threat
27. FMEA
Failure Modes and Effect Analysis
ISO/IEC 27005
performance monitor
risk catagories
28. Used in assurance risk mgmt - methodical way to ID major failure modes (not useful for complex failure modes)
vulnerability
FMEA
security governanace
ITIL
29. An password cracker that uses dictionary and brute force attacks - rainbow tables - can test password strength and recover passwords - was originally free - but now a commercial product
protocol analyzer
network mapping
OVAL
L0phtCrack
30. CSO
corporate security officer
network mapping
BS7799
ISO/IEC 27799
31. Mitigates a potential risk
BS7799
data owner
chief information security officer
countermeasure
32. A method of ID vulnerabililties and threats and assessing possible impacts to determine where to implement security safeguards
risk analysis
countermeasure
SP 800-30
CobiT
33. Midterm goals
single loss expectancy
blueprints
tactical
administrative
34. A tool that monitors network traffic - shows data and protocols in use - also known as a packet sniffer (i.e wireshark - TCPDump - Microsoft Network Monitor - Carnivore)
vulnerability
confidentiality
protocol analyzer
threat
35. An open source password cracker that uses dictionary and brute force attacks - stores previously cracked passwords - uses unshadow to merge password /shadow files
physical
john the ripper
Information risk management
blueprints
36. A plan of action to deal with risks defined in the risk assessment - may remediate or transfer risk
risk mitigation
protocol analyzer
usage
Control Objectives for Information and related Technology
37. A quantative risk assesment process that allows for tests to be conducted to allow users to determine areas that require a risk analysis
FRAP
physical
ITIL
john the ripper
38. Assurance of accurancy and reliability of information and systems
fault tree analysis
CobiT
integrity
Committee of Sponsoring Organizations
39. Establish - implement - control and improve the Information Security Managment System (based on BS7799 Part 2)
security officer
annualized rate of occurrence
ISO/IEC 27001
AS/NZS 4360
40. Number of time the incident might occur annually - (ARO)
annualized rate of occurrence
firewall
chief information security officer
ISO/IEC 27005
41. Collection of controls an organization must have in place
performance monitor
risk catagories
security program
exposure factor
42. Strategic - tactical and operational planning
Control Objectives for Information and related Technology
fault tree analysis
planning horizon
data owner
43. _______________ can test IDS - detect network congestion - detect bad / failing equipment - detect high processor loads - must be NOS appropriate
network mapping
exposure
tactical
Committee of Sponsoring Organizations
44. CISO
chief information security officer
Failure Modes and Effect Analysis
annualized loss expectancy
performance baseline
45. A weakness (software - hardware - procedural - human) that can be exploited
fault tree analysis
Information risk management
vulnerability
usage
46. Used to predict changes based on trends - detect deviations - and watch events across multiple system components
ITIL
performance monitor
ISO 17799
confidentiality
47. Physical damage - human interaction - equip malfunction - misuse of data - loss of data - application error
exposure factor
risk catagories
CISO
data owner
48. Provides good practice advice on ISMS (ISO 17799)(based on BS7799 Part 1)
risk
ISO/IEC 27002
fault tree analysis
ITIL
49. Ensures reliable timely access to data/resources to authorized individuals
COSO
L0phtCrack
availability
IRM
50. Security policy - map business objectives to security - Security infrastructure - security officer - reviews - Assest classification/control - inventory - Personnel security - screening - training - roles - Physical security - Communication/operation
Facilitated Risk Analysis Process
exposure
annualized loss expectancy
ISO 17799