Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 2 Part 1

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 111

Exam Question

Which of the solutions listed below add(s) redundancy in areas identified as single points of failure? (Select all that apply)

A. RAID ( Missed)
B. Dual-power supply ( Missed)
C. Virtualization
D. Failover clustering ( Missed)
E. Load balancing ( Missed)

Correct Answer

A. RAID
B. Dual-power supply
D. Failover clustering
E. Load balancing

Question 112

Exam Question

Which of the following terms is used to describe an average time required to repair a failed component or device?

A. MTBF
B. RPO
C. MTTR
D. SLA

Correct Answer

C. MTTR

Question 113

Exam Question

Which of the acronyms listed below refers to a maximum tolerable period of time required for restoring business functions after a failure or disaster?

A. SLA
B. RTO
C. AUP
D. RPO

Correct Answer

B. RTO

Question 114

Exam Question

Which of the following answers refers to the correct formula for calculating probable financial loss due to a risk over a one-year period?

A. SLE = AV x EF
B. ALE = ARO x SLE
C. SLE = ALE x AV
D. ALE = AV x EF

Correct Answer

B. ALE = ARO x SLE

Question 115

Exam Question

Which term describes the predicted loss of value to an asset based on a single security incident?

A. SLE
B. ARO
C. ALE
D. SLA

Correct Answer

A. SLE

Question 116

Exam Question

A calculation of the Single Loss Expectancy (SLE) is an example of:

A. Quantitative risk assessment
B. Risk deterrence
C. Qualitative risk assessment
D. Risk acceptance

Correct Answer

A. Quantitative risk assessment

Question 117

Exam Question

Which of the following statements are not true? (Select 2 answers)

A. Risk awareness is the acknowledgement of risk existence
B. Control risk is the risk caused by improper implementation of security controls
C. Risk appetite is the amount of risk an organization is willing to take in pursuit of its goals
D. Inherent risk is the remaining risk after implementing controls
E. Residual risk is the original level of risk that exist before implementing any controls

Correct Answer

D. Inherent risk is the remaining risk after implementing controls
E. Residual risk is the original level of risk that exist before implementing any controls

Question 118

Exam Question

Which of the following answers refers to a document containing detailed information on potential cybersecurity risks?

A. Risk register
B. Risk heat map
C. Risk matrix
D. Risk repository

Correct Answer

A. Risk register

Question 119

Exam Question

Cybersecurity insurance is an example of which risk management strategy?

A. Risk avoidance
B. Risk deterrence
C. Risk transference
D. Risk acceptance

Correct Answer

C. Risk transference

Question 120

Exam Question

Disabling certain system functions or shutting down the system when risks are identified is an example of:

A. Risk acceptance
B. Risk avoidance
C. Risk transference
D. Risk deterrence

Correct Answer

B. Risk avoidance