Rpo Security Plus
14 community-sourced questions and answers. Free — no login.
Which type of analysis is based on monetary values? A. Trend B. Qualitative risk analysis C. Quantitative analysis D. Business impact
C. Quantitative analysis
Your company purchases a cyber insurance policy for web site protection against DDoS attacks. What type of risk response is this? A. Risk transfer B. Risk mitigation C. Risk acceptance D. Risk avoidance
A. Risk transfer
Which term relates to how long it takes to restore a service or business function? A. RPO B. MTD C. RTO D. SLA
C. RTO
Proper change management procedures must document activities. Where are these activities documented? A. ITIL log B. Change log C. System log D. Risk log
B. Change log
Which type of analysis is based on expert opinions? A. Qualitative risk analysis B. Business impact C. Quantitative analysis D. Trend
A. Qualitative risk analysis
Which activity determines if PII is being handled properly? A. Privacy impact assessment B. Vulnerability assessment C. Risk assessment D. Penetration test
A. Privacy impact assessment
How is residual risk defined? A. Risk transfer B. Total risk minus safeguard C. Risk acceptance D. Safeguard minus total risk
B. Total risk minus safeguard
Which type of document maps out how a business can resume operations as quickly as possible in the event of a disaster? A. Risk assessment B. Business continuity plan C. Business impact analysis D. Disaster recovery plan
B. Business continuity plan
Which threat attribute is used to assign priorities? A. Threat source B. Threat age C. Likelihood of occurrence D. Security control
C. Likelihood of occurrence
A malicious user intentionally takes advantage of a wireless router weakness. Which term describes this action? A. Exploit B. Vulnerability C. Threat D. Risk
A. Exploit
Which term describes the amount of time between failure of a service, components, or business process? A. RTO B. RPO C. MTTR D. MTBF
D. MTBF
Which term describe a central repository of identified risks? A. Risk collection B. Risk store C. Risk registry D. Risk repository
C. Risk registry
Your company requires a report identifying IT weaknesses on the network for regulatory compliance so that the security controls can be put in place. What should be done? A. Penetration test B. Business impact analysis C. Vulnerability assessment D. Risk assessment
C. Vulnerability assessment
Which type of document focuses on how negative incidents affect an organization? A. Business continuity plan B. Disaster recovery plan C. Business impact analysis D. Vulnerability assessment
C. Business impact analysis
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials