ExamGecko
Home Home / CompTIA / FC0-U61

CompTIA FC0-U61 Practice Test - Questions Answers, Page 15

Question list
Search
Search

List of questions

Search

A company is concerned with ensuring its databases are highly available. Which of the following can be used to increase database availability?

A.
Backups
A.
Backups
Answers
B.
Prioritization
B.
Prioritization
Answers
C.
Indexes
C.
Indexes
Answers
D.
Failover
D.
Failover
Answers
Suggested answer: D

A user revisits a website and receives a message that the site may not be secure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue?

A.
Checking the proxy settings
A.
Checking the proxy settings
Answers
B.
Checking that caching is enabled
B.
Checking that caching is enabled
Answers
C.
Checking browser add-ons
C.
Checking browser add-ons
Answers
D.
Checking certificate validity
D.
Checking certificate validity
Answers
Suggested answer: D

A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?

A.
Antivirus
A.
Antivirus
Answers
B.
Anti-malware
B.
Anti-malware
Answers
C.
Device Manager
C.
Device Manager
Answers
D.
Host firewall
D.
Host firewall
Answers
Suggested answer: D

Which of the following contains exactly four copper wires?

A.
RJ45
A.
RJ45
Answers
B.
VGA
B.
VGA
Answers
C.
RJ11
C.
RJ11
Answers
D.
USB
D.
USB
Answers
Suggested answer: C

A technician replaces the video card in a user's PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?

A.
Replace the user's display.
A.
Replace the user's display.
Answers
B.
Update the PC's operating system.
B.
Update the PC's operating system.
Answers
C.
Replace the video cable.
C.
Replace the video cable.
Answers
D.
Install new video drivers.
D.
Install new video drivers.
Answers
Suggested answer: D

All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?

A.
Server
A.
Server
Answers
B.
Tape library
B.
Tape library
Answers
C.
External HDD
C.
External HDD
Answers
D.
Workstation
D.
Workstation
Answers
Suggested answer: A

Which of the following types of network security deals with deviations from the historic connection patterns and analysis of new threats to provide effective mitigation responses?

A.
Behavior security
A.
Behavior security
Answers
B.
Information Identity Management
B.
Information Identity Management
Answers
C.
Unauthorized hacking
C.
Unauthorized hacking
Answers
D.
Authorized hacking
D.
Authorized hacking
Answers
Suggested answer: A

A web developer wants to ensure that a new web application is not vulnerable to brute-force attacks. Which of the following best practices is MOST useful to meet this goal?

A.
Input validation
A.
Input validation
Answers
B.
System updates
B.
System updates
Answers
C.
Password lockout
C.
Password lockout
Answers
D.
Login auditing
D.
Login auditing
Answers
Suggested answer: C

Which of the following is the number of bytes that is in 2KB?

A.
1024
A.
1024
Answers
B.
2048
B.
2048
Answers
C.
20000
C.
20000
Answers
D.
1048576
D.
1048576
Answers
Suggested answer: B

A WPA2 enterprise wireless network has been subject to several attacks within the last month. Which of the following would be the BEST option to improve the security of the network?

A.
Change the SSID.
A.
Change the SSID.
Answers
B.
Change the default password.
B.
Change the default password.
Answers
C.
Change to WEP security.
C.
Change to WEP security.
Answers
D.
Create a guest network.
D.
Create a guest network.
Answers
Suggested answer: D
Total 425 questions
Go to page: of 43