Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 4 Part 2

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 351

Exam Question

Which of the following devices best illustrates the concept of edge computing?

A. Router
B. Smartwatch
C. Thin client
D. Server

Correct Answer

B. Smartwatch

Question 352

Exam Question

The term “Fog computing” refers to a local network infrastructure between IoT devices and the cloud designed to speed up data transmission and processing.

A. True
B. False

Correct Answer

A. True

Question 353

Exam Question

Which of the following would be the best solution for a company that needs IT services but lacks any IT personnel?

A. MSA
B. MaaS
C. MSP
D. MSSP

Correct Answer

C. MSP

Question 354

Exam Question

What is the name of a cloud computing deployment model in which the cloud infrastructure is provisioned for open use by the general public?

A. Hybrid cloud
B. Private cloud
C. Community cloud
D. Public cloud

Correct Answer

D. Public cloud

Question 355

Exam Question

Which cloud service model would provide the best solution for a web developer intending to create a web app?

A. XaaS
B. SaaS
C. PaaS
D. IaaS

Correct Answer

C. PaaS

Question 356

Exam Question

Which of the following is an example of fake telemetry?

A. OSINT
B. Bluejacking
C. DNS sinkhole
D. Replay attack

Correct Answer

C. DNS sinkhole

Question 357

Exam Question

Which alternate site allows for fastest disaster recovery?

A. Cold site
B. Hot site
C. Warm site

Correct Answer

B. Hot site

Question 358

Exam Question

Which of the following terms refers to a duplicate of the original site, with fully operational computer systems as well as near-complete backups of user data?

A. Hot site
B. Warm site
C. Cold site

Correct Answer

A. Hot site

Question 359

Exam Question

In the field of data security, the term “Tokenization” refers to the process of replacing sensitive data with nonsensitive information which holds a reference to the original data and enables its processing but has no value when breached.

A. True
B. False

Correct Answer

A. True

Question 360

Exam Question

Which of the following acronyms refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information?

A. DRP
B. DHE
C. DLP
D. DEP

Correct Answer

C. DLP