Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 7 Part 2

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 691

Exam Question

In client-server model, the term “Thin client” refers to a networked computer equipped with the minimum amount of hardware and software components. As opposed to thick client, which runs applications locally from its own hard drive, thin client relies on network resources provided by a remote server performing most of the data processing and storage functions.

A. True
B. False

Correct Answer

A. True

Question 692

Exam Question

Which of the following solutions would be best suited for situations where response time in data processing is of critical importance?

A. Edge computing
B. Thin client architecture
C. Fog computing
D. Cloud computing

Correct Answer

A. Edge computing

Question 693

Exam Question

Which of the following terms refers to a third-party vendor offering IT security management services? (Select best answer)

A. MSP
B. MaaS
C. MSA
D. MSSP

Correct Answer

D. MSSP

Question 694

Exam Question

A cloud deployment model consisting of two or more interlinked cloud infrastructures (private, community, or public) is referred to as a hybrid cloud.

A. True
B. False

Correct Answer

A. True

Question 695

Exam Question

A cloud computing service model offering remote access to applications based on monthly or annual subscription fee is called:

A. PaaS
B. SaaS
C. IaaS
D. XaaS

Correct Answer

B. SaaS

Question 696

Exam Question

Which of the following answers refers to a cloud computing service model in which clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software?

A. SaaS
B. XaaS
C. PaaS
D. IaaS

Correct Answer

D. IaaS

Question 697

Exam Question

A monitored host holding no valuable data specifically designed to detect unauthorized access attempts and divert attacker’s attention from the actual network is known as:

A. Captive portal
B. Honeynet
C. UTM appliance
D. Honeypot

Correct Answer

D. Honeypot

Question 698

Exam Question

A disaster recovery facility that provides only the physical space for recovery operations is called:

A. Hot site
B. Warm site
C. Cold site
D. Mirror site

Correct Answer

C. Cold site

Question 699

Exam Question

A hash function allows for mapping large amount of data content to a small string of characters. The result of hash function provides the exact “content in a nutshell” (in the form of a string of characters) derived from the original data content. In case there is any change to the data after the original hash was taken, the next time when hash function is applied, the resulting hash value calculated after content modification will be different from the original hash.

A. True
B. False

Correct Answer

A. True

Question 700

Exam Question

Which of the three states of digital data requires data to be processed in an unencrypted form?

A. At rest
B. In transit/motion
C. In processing

Correct Answer

C. In processing