CompTIA Security+ Certification Exam SY0-701 Practice Test 23 Flashcards
An estimate based on the historical data of how often a threat would be successful in exploiting a vulnerability is known as:
A) ALE
B) SLA
C) ARO
D) SLE
C) ARO
In the context of risk assessment, the Exposure Factor (EF) is defined as the percentage of loss that a realized threat would have on an asset. If an organization has an asset valued at $10,000 and the EF is determined to be 20%, what would be the SLE?
A) $500
B) $2,000
C) $5,000
D) $10,000
B) $2,000
Which of the answers listed below refers to a comprehensive document used in risk management and project management to identify, assess, and track risks?
A) Risk register
B) Risk heat map
C) Risk matrix
D) Risk repository
A) Risk register
Which of the following terms is used to describe the specific level of risk an organization is prepared to accept in pursuit of its objectives?
A) Risk appetite
B) Risk tolerance
C) Risk acceptance
D) Risk capacity
B) Risk tolerance
Which of the terms listed below refers to a general term that describes an organization’s overall attitude towards risk-taking?
A) Risk strategy
B) Risk control
C) Risk appetite
D) Risk tolerance
C) Risk appetite
Contracting out a specialized technical component when the company’s employees lack the necessary skills is an example of:
A) Risk deterrence
B) Risk avoidance
C) Risk acceptance
D) Risk transference
D) Risk transference
Cybersecurity insurance is an example of which risk management strategy?
A) Risk avoidance
B) Risk deterrence
C) Risk transference
D) Risk acceptance
C) Risk transference
In the context of risk acceptance, choosing not to apply certain controls or safeguards for a specific risk is called:
A) Exception
B) Evasion
C) Exemption
D) Exclusion
C) Exemption
In the risk acceptance strategy, the practice of temporarily not complying with a standard or policy due to a specific risk scenario is referred to as:
A) Exclusion
B) Exception
C) Evasion
D) Exemption
B) Exception
Disabling certain system functions or shutting down the system when risks are identified is an example of:
A) Risk acceptance
B) Risk avoidance
C) Risk transference
D) Risk deterrence
B) Risk avoidance
Which of the following terms describes the process of taking proactive measures to reduce the impact of identified risks?
A) Risk acceptance
B) Risk avoidance
C) Risk transference
D) Risk mitigation
D) Risk mitigation
Which of the acronyms listed below refers to a maximum allowable time to restore critical business functions after a disruption?
A) SLA
B) RTO
C) MTTF
D) RPO
B) RTO
Which of the following defines the maximum acceptable amount of data loss measured by a specific point in time before a disaster or outage?
A) RPO
B) MTBF
C) RTO
D) MTTR
A) RPO
Which of the terms listed below is used to describe the average time required to repair a failed component or device?
A) MTBF
B) RPO
C) MTTR
D) SLA
C) MTTR
A high MTBF value indicates that a component or system provides low reliability and is more likely to fail.
A) True
B) False
B) False