CompTIA Security+ Practice Exam 1 SY0-401 CompTIA Security+ Practice Exam 1 SY0-401 The ability to hide few things from an Operating system is there in some programs, these programs are called ______________. A. Freeware B. Adware C. Viruses D. Rootkits _________ is the term used when dealing with threats, vulnerabilities or impact incurred while loss of information. a) Risk Assessment b) Risk Analysis c) Risk Calculation d) All of the above ____________________ is a weakness that can be exploited by a threat. A. Scalability B. Vulnerability C. Hacktivity D.None of the above Phishing combined with VOIP is known as ________________ A. VOIP Phishing B. Vishing C. Whailing D. Hoaxes SLE (Single Loss Expectancy) is a term used in Risk Calculations which is used to represent how much loss is expected at one single time. Which of the below are components of SLE? A. AV (Asset Value) B. ARO C. ALE D. FV ARO is the likelihood of an event occurring within span of a year. ARO stands for ___________ A. Accountable Risk Occurrence B. Annualized Risk Occurred C. Annualized rate of occurrence D. Actual Risk Occurred _______________ is the measure of how much loss is expected in a year in reference to Risk Calculations. A. ALE B. SLE C. ARO D. None of the above Which of the below documents need to be part of any interoperability agreement? A.SLA B. MOU C. BPO D. All of the above __________________ is an encryption method in Windows through with the entire volume can be encrypted with 128 bit encryption. A. Bitgrasper B. ByteLocker C. BitLocker D. BitCollector According to NIST (National Institute of Standards and Technology) __________ is a score that represents the possibility of a threat being initiated. A. CSAT B. Likelihood C. Service Level Agreement D. None of the above Loading … Question 1 of 10 More Tests A+ Practice Test A+ 220-901 and 220-902 Practice Test Network+ Practice Test Security+ Practice Test