Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 5 Part 2

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 451

Exam Question

Which of the following acronyms refers to any type of information pertaining to an individual that can be used to uniquely identify that person?

A. PHI
B. Biometrics
C. PII
D. PKI

Correct Answer

C. PII

Question 452

Exam Question

High MTBF value indicates that a component or system provides low reliability and is more likely to fail.

A. True
B. False

Correct Answer

B. False

Question 453

Exam Question

In Business Continuity Planning (BCP), the maximum tolerable point in time to which systems and data must be recovered after an outage is called:

A. RPO
B. MTBF
C. RTO
D. MTTR

Correct Answer

A. RPO

Question 454

Exam Question

An estimate based on the historical data of how often a threat would be successful in exploiting a vulnerability is known as:

A. ALE
B. SLA
C. ARO
D. SLE

Correct Answer

C. ARO

Question 455

Exam Question

Which of the acronyms listed below refers to a risk assessment formula defining probable financial loss due to a risk over a one-year period?

A. ARO
B. SLE
C. ALE
D. SLA

Correct Answer

C. ALE

Question 456

Exam Question

In quantitative risk assessment, this term is used for estimating the likelihood of occurrence of a future threat.

A. ALE
B. SLA
C. ARO
D. SLE

Correct Answer

C. ARO

Question 457

Exam Question

Assessment of risk probability and its impact based on subjective judgment falls into the category of:

A. Risk acceptance
B. Quantitative risk assessment
C. Risk transference
D. Qualitative risk assessment

Correct Answer

D. Qualitative risk assessment

Question 458

Exam Question

Which of the following answers refer to an assessment tool used for prioritizing the severity of different risks? (Select 2 answers)

A. Risk register
B. Quantitative risk assessment
C. Risk heat map
D. Disaster Recovery Plan (DRP)
F. Risk matrix

Correct Answer

C. Risk heat map
F. Risk matrix

Question 459

Exam Question

Which of the following is an example of a risk mitigation strategy?

A. Implementation of security controls
B. System shutdown
C. IT personnel outsourcing
D. Cybersecurity insurance

Correct Answer

A. Implementation of security controls

Question 460

Exam Question

Contracting out a specialized technical component when the company’s employees lack the necessary skills is an example of:

A. Risk deterrence
B. Risk avoidance
C. Risk acceptance
D. Risk transference

Correct Answer

D. Risk transference