The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 451
- Exam Question
- Correct Answer
- Question 452
- Exam Question
- Correct Answer
- Question 453
- Exam Question
- Correct Answer
- Question 454
- Exam Question
- Correct Answer
- Question 455
- Exam Question
- Correct Answer
- Question 456
- Exam Question
- Correct Answer
- Question 457
- Exam Question
- Correct Answer
- Question 458
- Exam Question
- Correct Answer
- Question 459
- Exam Question
- Correct Answer
- Question 460
- Exam Question
- Correct Answer
Question 451
Exam Question
Which of the following acronyms refers to any type of information pertaining to an individual that can be used to uniquely identify that person?
A. PHI
B. Biometrics
C. PII
D. PKI
Correct Answer
C. PII
Question 452
Exam Question
High MTBF value indicates that a component or system provides low reliability and is more likely to fail.
A. True
B. False
Correct Answer
B. False
Question 453
Exam Question
In Business Continuity Planning (BCP), the maximum tolerable point in time to which systems and data must be recovered after an outage is called:
A. RPO
B. MTBF
C. RTO
D. MTTR
Correct Answer
A. RPO
Question 454
Exam Question
An estimate based on the historical data of how often a threat would be successful in exploiting a vulnerability is known as:
A. ALE
B. SLA
C. ARO
D. SLE
Correct Answer
C. ARO
Question 455
Exam Question
Which of the acronyms listed below refers to a risk assessment formula defining probable financial loss due to a risk over a one-year period?
A. ARO
B. SLE
C. ALE
D. SLA
Correct Answer
C. ALE
Question 456
Exam Question
In quantitative risk assessment, this term is used for estimating the likelihood of occurrence of a future threat.
A. ALE
B. SLA
C. ARO
D. SLE
Correct Answer
C. ARO
Question 457
Exam Question
Assessment of risk probability and its impact based on subjective judgment falls into the category of:
A. Risk acceptance
B. Quantitative risk assessment
C. Risk transference
D. Qualitative risk assessment
Correct Answer
D. Qualitative risk assessment
Question 458
Exam Question
Which of the following answers refer to an assessment tool used for prioritizing the severity of different risks? (Select 2 answers)
A. Risk register
B. Quantitative risk assessment
C. Risk heat map
D. Disaster Recovery Plan (DRP)
F. Risk matrix
Correct Answer
C. Risk heat map
F. Risk matrix
Question 459
Exam Question
Which of the following is an example of a risk mitigation strategy?
A. Implementation of security controls
B. System shutdown
C. IT personnel outsourcing
D. Cybersecurity insurance
Correct Answer
A. Implementation of security controls
Question 460
Exam Question
Contracting out a specialized technical component when the company’s employees lack the necessary skills is an example of:
A. Risk deterrence
B. Risk avoidance
C. Risk acceptance
D. Risk transference
Correct Answer
D. Risk transference