ExamGecko
Home Home / CompTIA / FC0-U61

CompTIA FC0-U61 Practice Test - Questions Answers, Page 19

Question list
Search
Search

List of questions

Search

Which of the following is the BEST method for ensuring there is no Telnet access?

A.
Network sniffer
A.
Network sniffer
Answers
B.
Intrusion detection system
B.
Intrusion detection system
Answers
C.
Antivirus software
C.
Antivirus software
Answers
D.
Host-based firewall
D.
Host-based firewall
Answers
Suggested answer: D

Which of the following types of software is MOST effective for tracking and communi eating time spent on tasks for each team member?

A.
Spreadsheet
A.
Spreadsheet
Answers
B.
Collaborative workspace
B.
Collaborative workspace
Answers
C.
Project management
C.
Project management
Answers
D.
Personal information management
D.
Personal information management
Answers
Suggested answer: C

A user needs to connect a laptop to an Etherne: port in the room. Which of the following types of connections does the user need?

A.
RG6
A.
RG6
Answers
B.
DB9
B.
DB9
Answers
C.
RJ11
C.
RJ11
Answers
D.
RJ45
D.
RJ45
Answers
Suggested answer: D

Which of the following computing devices is MOST likely to have an internal wireless antenna?

A.
Mobile phone
A.
Mobile phone
Answers
B.
Workstation
B.
Workstation
Answers
C.
Server
C.
Server
Answers
D.
NAS
D.
NAS
Answers
Suggested answer: A

Multiple users are reporting issues with their workstations. A technician is reviewing patch installation history. Which of the following steps in the t'oubleshooting methodology is the technician executing?

A.
Implement the solution.
A.
Implement the solution.
Answers
B.
Identify the problem.
B.
Identify the problem.
Answers
C.
Verify system functionality.
C.
Verify system functionality.
Answers
D.
Establish a theory of the cause.
D.
Establish a theory of the cause.
Answers
Suggested answer: B

A security engineer is attempting to justify a large investment in security IT infrastructure. The business has a limited budget and is reluctant to invest. Which of the following should the business consider in the analysis?

A.
Loss of revenue in case of a breach
A.
Loss of revenue in case of a breach
Answers
B.
Difficulty of integration
B.
Difficulty of integration
Answers
C.
Training involved for IT staff and users
C.
Training involved for IT staff and users
Answers
D.
Amount of equipment that will be replaced
D.
Amount of equipment that will be replaced
Answers
Suggested answer: A

A security administrator needs to set up multifactor authentication for a cloud application. Which of the following should the administrator use to establish an authentication process? (Choose two.)

A.
Logs
A.
Logs
Answers
B.
Password
B.
Password
Answers
C.
Receipt
C.
Receipt
Answers
D.
Encryption
D.
Encryption
Answers
E.
Database
E.
Database
Answers
F.
Software token
F.
Software token
Answers
Suggested answer: B, F

A program will request user input and perform an operation several times if the input is correct. Which of the following techniques BEST describes the fact that the operation is only performed if the input is correct?

A.
Looping
A.
Looping
Answers
B.
Branching
B.
Branching
Answers
C.
Reuse
C.
Reuse
Answers
D.
Modeling
D.
Modeling
Answers
Suggested answer: A

A company is developing an application that will be used to simplify typing on a virtual keyboard. This will MOST likely be installed on:

A.
a mobile OS.
A.
a mobile OS.
Answers
B.
a workstation OS.
B.
a workstation OS.
Answers
C.
a server OS.
C.
a server OS.
Answers
D.
an embedded OS.
D.
an embedded OS.
Answers
Suggested answer: A

Which of the following examples are MOST typical of fault tolerance practices used in business continuity planning? (Choose two.)

A.
RAID storage
A.
RAID storage
Answers
B.
Uninterruptible power supplies
B.
Uninterruptible power supplies
Answers
C.
Off-site backups
C.
Off-site backups
Answers
D.
Private cloud servers
D.
Private cloud servers
Answers
E.
Virtual-hosted desktops
E.
Virtual-hosted desktops
Answers
F.
Warm sites
F.
Warm sites
Answers
Suggested answer: B, C
Total 425 questions
Go to page: of 43