CompTIA FC0-U61 Practice Test - Questions Answers, Page 19

List of questions
Question 181

Which of the following is the BEST method for ensuring there is no Telnet access?
Question 182

Which of the following types of software is MOST effective for tracking and communi eating time spent on tasks for each team member?
Question 183

A user needs to connect a laptop to an Etherne: port in the room. Which of the following types of connections does the user need?
Question 184

Which of the following computing devices is MOST likely to have an internal wireless antenna?
Question 185

Multiple users are reporting issues with their workstations. A technician is reviewing patch installation history. Which of the following steps in the t'oubleshooting methodology is the technician executing?
Question 186

A security engineer is attempting to justify a large investment in security IT infrastructure. The business has a limited budget and is reluctant to invest. Which of the following should the business consider in the analysis?
Question 187

A security administrator needs to set up multifactor authentication for a cloud application. Which of the following should the administrator use to establish an authentication process? (Choose two.)
Question 188

A program will request user input and perform an operation several times if the input is correct. Which of the following techniques BEST describes the fact that the operation is only performed if the input is correct?
Question 189

A company is developing an application that will be used to simplify typing on a virtual keyboard. This will MOST likely be installed on:
Question 190

Which of the following examples are MOST typical of fault tolerance practices used in business continuity planning? (Choose two.)
Question