ExamGecko
Home / CompTIA / FC0-U61 / List of questions
Ask Question

CompTIA FC0-U61 Practice Test - Questions Answers, Page 15

Add to Whishlist

List of questions

Question 141

Report Export Collapse

A company is concerned with ensuring its databases are highly available. Which of the following can be used to increase database availability?

Become a Premium Member for full access
  Unlock Premium Member

Question 142

Report Export Collapse

A user revisits a website and receives a message that the site may not be secure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 143

Report Export Collapse

A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?

Become a Premium Member for full access
  Unlock Premium Member

Question 144

Report Export Collapse

Which of the following contains exactly four copper wires?

Become a Premium Member for full access
  Unlock Premium Member

Question 145

Report Export Collapse

A technician replaces the video card in a user's PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?

Become a Premium Member for full access
  Unlock Premium Member

Question 146

Report Export Collapse

All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?

Become a Premium Member for full access
  Unlock Premium Member

Question 147

Report Export Collapse

Which of the following types of network security deals with deviations from the historic connection patterns and analysis of new threats to provide effective mitigation responses?

Become a Premium Member for full access
  Unlock Premium Member

Question 148

Report Export Collapse

A web developer wants to ensure that a new web application is not vulnerable to brute-force attacks. Which of the following best practices is MOST useful to meet this goal?

Become a Premium Member for full access
  Unlock Premium Member

Question 149

Report Export Collapse

Which of the following is the number of bytes that is in 2KB?

Become a Premium Member for full access
  Unlock Premium Member

Question 150

Report Export Collapse

A WPA2 enterprise wireless network has been subject to several attacks within the last month. Which of the following would be the BEST option to improve the security of the network?

Become a Premium Member for full access
  Unlock Premium Member
Total 425 questions
Go to page: of 43
Search