The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 351
- Exam Question
- Correct Answer
- Question 352
- Exam Question
- Correct Answer
- Question 353
- Exam Question
- Correct Answer
- Question 354
- Exam Question
- Correct Answer
- Question 355
- Exam Question
- Correct Answer
- Question 356
- Exam Question
- Correct Answer
- Question 357
- Exam Question
- Correct Answer
- Question 358
- Exam Question
- Correct Answer
- Question 359
- Exam Question
- Correct Answer
- Question 360
- Exam Question
- Correct Answer
Question 351
Exam Question
Which of the following devices best illustrates the concept of edge computing?
A. Router
B. Smartwatch
C. Thin client
D. Server
Correct Answer
B. Smartwatch
Question 352
Exam Question
The term “Fog computing” refers to a local network infrastructure between IoT devices and the cloud designed to speed up data transmission and processing.
A. True
B. False
Correct Answer
A. True
Question 353
Exam Question
Which of the following would be the best solution for a company that needs IT services but lacks any IT personnel?
A. MSA
B. MaaS
C. MSP
D. MSSP
Correct Answer
C. MSP
Question 354
Exam Question
What is the name of a cloud computing deployment model in which the cloud infrastructure is provisioned for open use by the general public?
A. Hybrid cloud
B. Private cloud
C. Community cloud
D. Public cloud
Correct Answer
D. Public cloud
Question 355
Exam Question
Which cloud service model would provide the best solution for a web developer intending to create a web app?
A. XaaS
B. SaaS
C. PaaS
D. IaaS
Correct Answer
C. PaaS
Question 356
Exam Question
Which of the following is an example of fake telemetry?
A. OSINT
B. Bluejacking
C. DNS sinkhole
D. Replay attack
Correct Answer
C. DNS sinkhole
Question 357
Exam Question
Which alternate site allows for fastest disaster recovery?
A. Cold site
B. Hot site
C. Warm site
Correct Answer
B. Hot site
Question 358
Exam Question
Which of the following terms refers to a duplicate of the original site, with fully operational computer systems as well as near-complete backups of user data?
A. Hot site
B. Warm site
C. Cold site
Correct Answer
A. Hot site
Question 359
Exam Question
In the field of data security, the term “Tokenization” refers to the process of replacing sensitive data with nonsensitive information which holds a reference to the original data and enables its processing but has no value when breached.
A. True
B. False
Correct Answer
A. True
Question 360
Exam Question
Which of the following acronyms refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information?
A. DRP
B. DHE
C. DLP
D. DEP
Correct Answer
C. DLP