Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 8 Part 2

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 781

Exam Question

Which of the following answers refer to smishing? (Select 2 answers)

A. Social engineering technique
B. E-mail communication
C. Spam over Internet Telephony (SPIT)
D. Text messaging
E. Spam over Internet Messaging (SPIM)

Correct Answer

A. Social engineering technique
D. Text messaging

Question 782

Exam Question

An estimate based on the historical data of how often a threat would be successful in exploiting a vulnerability is known as:

A. ALE
B. SLA
C. ARO
D. SLE

Correct Answer

C. ARO

Question 783

Exam Question

Which of the acronyms listed below refers to a risk assessment formula defining probable financial loss due to a risk over a one-year period?

A. ARO
B. SLE
C. ALE
D. SLA

Correct Answer

C. ALE

Question 784

Exam Question

In quantitative risk assessment, this term is used for estimating the likelihood of occurrence of a future threat.

A. ALE
B. SLA
C. ARO
D. SLE

Correct Answer

C. ARO

Question 785

Exam Question

Assessment of risk probability and its impact based on subjective judgment falls into the category of:

A. Risk acceptance
B. Quantitative risk assessment
C. Risk transference
D. Qualitative risk assessment

Correct Answer

D. Qualitative risk assessment

Question 786

Exam Question

Which of the following answers refer to an assessment tool used for prioritizing the severity of different risks? (Select 2 answers)

A. Risk register
B. Quantitative risk assessment
C. Risk heat map
D. Disaster Recovery Plan (DRP)
E. Risk matrix

Correct Answer

C. Risk heat map
E. Risk matrix

Question 787

Exam Question

Which of the following is an example of a risk mitigation strategy?

A. Implementation of security controls
B. System shutdown
C. IT personnel outsourcing
D. Cybersecurity insurance

Correct Answer

A. Implementation of security controls

Question 788

Exam Question

Contracting out a specialized technical component when the company’s employees lack the necessary skills is an example of:

A. Risk deterrence
B. Risk avoidance
C. Risk acceptance
D. Risk transference

Correct Answer

D. Risk transference

Question 789

Exam Question

Which of the following terms relates closely to the concept of residual risk?

A. Risk deterrence
B. Risk transference
C. Risk acceptance
D. Risk avoidance

Correct Answer

C. Risk acceptance