The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 781
- Exam Question
- Correct Answer
- Question 782
- Exam Question
- Correct Answer
- Question 783
- Exam Question
- Correct Answer
- Question 784
- Exam Question
- Correct Answer
- Question 785
- Exam Question
- Correct Answer
- Question 786
- Exam Question
- Correct Answer
- Question 787
- Exam Question
- Correct Answer
- Question 788
- Exam Question
- Correct Answer
- Question 789
- Exam Question
- Correct Answer
Question 781
Exam Question
Which of the following answers refer to smishing? (Select 2 answers)
A. Social engineering technique
B. E-mail communication
C. Spam over Internet Telephony (SPIT)
D. Text messaging
E. Spam over Internet Messaging (SPIM)
Correct Answer
A. Social engineering technique
D. Text messaging
Question 782
Exam Question
An estimate based on the historical data of how often a threat would be successful in exploiting a vulnerability is known as:
A. ALE
B. SLA
C. ARO
D. SLE
Correct Answer
C. ARO
Question 783
Exam Question
Which of the acronyms listed below refers to a risk assessment formula defining probable financial loss due to a risk over a one-year period?
A. ARO
B. SLE
C. ALE
D. SLA
Correct Answer
C. ALE
Question 784
Exam Question
In quantitative risk assessment, this term is used for estimating the likelihood of occurrence of a future threat.
A. ALE
B. SLA
C. ARO
D. SLE
Correct Answer
C. ARO
Question 785
Exam Question
Assessment of risk probability and its impact based on subjective judgment falls into the category of:
A. Risk acceptance
B. Quantitative risk assessment
C. Risk transference
D. Qualitative risk assessment
Correct Answer
D. Qualitative risk assessment
Question 786
Exam Question
Which of the following answers refer to an assessment tool used for prioritizing the severity of different risks? (Select 2 answers)
A. Risk register
B. Quantitative risk assessment
C. Risk heat map
D. Disaster Recovery Plan (DRP)
E. Risk matrix
Correct Answer
C. Risk heat map
E. Risk matrix
Question 787
Exam Question
Which of the following is an example of a risk mitigation strategy?
A. Implementation of security controls
B. System shutdown
C. IT personnel outsourcing
D. Cybersecurity insurance
Correct Answer
A. Implementation of security controls
Question 788
Exam Question
Contracting out a specialized technical component when the company’s employees lack the necessary skills is an example of:
A. Risk deterrence
B. Risk avoidance
C. Risk acceptance
D. Risk transference
Correct Answer
D. Risk transference
Question 789
Exam Question
Which of the following terms relates closely to the concept of residual risk?
A. Risk deterrence
B. Risk transference
C. Risk acceptance
D. Risk avoidance
Correct Answer
C. Risk acceptance