IT CertificationsAnswer Key

Rpo Security Plus

14 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Which type of analysis is based on monetary values? A. Trend B. Qualitative risk analysis C. Quantitative analysis D. Business impact

ANSWER

C. Quantitative analysis

QUESTION 2

Your company purchases a cyber insurance policy for web site protection against DDoS attacks. What type of risk response is this? A. Risk transfer B. Risk mitigation C. Risk acceptance D. Risk avoidance

ANSWER

A. Risk transfer

QUESTION 3

Which term relates to how long it takes to restore a service or business function? A. RPO B. MTD C. RTO D. SLA

ANSWER

C. RTO

QUESTION 4

Proper change management procedures must document activities. Where are these activities documented? A. ITIL log B. Change log C. System log D. Risk log

ANSWER

B. Change log

QUESTION 5

Which type of analysis is based on expert opinions? A. Qualitative risk analysis B. Business impact C. Quantitative analysis D. Trend

ANSWER

A. Qualitative risk analysis

QUESTION 6

Which activity determines if PII is being handled properly? A. Privacy impact assessment B. Vulnerability assessment C. Risk assessment D. Penetration test

ANSWER

A. Privacy impact assessment

QUESTION 7

How is residual risk defined? A. Risk transfer B. Total risk minus safeguard C. Risk acceptance D. Safeguard minus total risk

ANSWER

B. Total risk minus safeguard

QUESTION 8

Which type of document maps out how a business can resume operations as quickly as possible in the event of a disaster? A. Risk assessment B. Business continuity plan C. Business impact analysis D. Disaster recovery plan

ANSWER

B. Business continuity plan

QUESTION 9

Which threat attribute is used to assign priorities? A. Threat source B. Threat age C. Likelihood of occurrence D. Security control

ANSWER

C. Likelihood of occurrence

QUESTION 10

A malicious user intentionally takes advantage of a wireless router weakness. Which term describes this action? A. Exploit B. Vulnerability C. Threat D. Risk

ANSWER

A. Exploit

QUESTION 11

Which term describes the amount of time between failure of a service, components, or business process? A. RTO B. RPO C. MTTR D. MTBF

ANSWER

D. MTBF

QUESTION 12

Which term describe a central repository of identified risks? A. Risk collection B. Risk store C. Risk registry D. Risk repository

ANSWER

C. Risk registry

QUESTION 13

Your company requires a report identifying IT weaknesses on the network for regulatory compliance so that the security controls can be put in place. What should be done? A. Penetration test B. Business impact analysis C. Vulnerability assessment D. Risk assessment

ANSWER

C. Vulnerability assessment

QUESTION 14

Which type of document focuses on how negative incidents affect an organization? A. Business continuity plan B. Disaster recovery plan C. Business impact analysis D. Vulnerability assessment

ANSWER

C. Business impact analysis

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials