A security administrator needs to set up multifactor authentication for a cloud application. Which of the following should the administrator use to establish an authentication process? (Choose two.)
A. Logs
B. Password
C. Receipt
D. Encryption
E. Database
F. Software token
A security engineer is attempting to justify a large investment in security IT infrastructure. The business has a limited budget and is reluctant to invest. Which of the following should the business consider in the analysis?
A. Loss of revenue in case of a breach
B. Difficulty of integration
C. Training involved for IT staff and users
D. Amount of equipment that will be replaced
Multiple users are reporting issues with their workstations. A technician is reviewing patch installation history. Which of the following steps in the troubleshooting methodology is the technician executing?
A. Implement the solution.
B. Identify the problem.
C. Verify system functionality.
D. Establish a theory of the cause.
Which of the following computing devices is MOST likely to have an internal wireless antenna?
A. Mobile phone
B. Workstation
C. Server
D. NAS
A user needs to connect a laptop to an Ethernet port in the room. Which of the following types of connections does the user need?
A. RG6
B. DB9
C. RJ11
D. RJ45
Which of the following types of software is MOST effective for tracking and communicating time spent on tasks for each team member?
A. Spreadsheet
B. Collaborative workspace
C. Project management
D. Personal information management
Which of the following is the BEST method for ensuring there is no Telnet access?
A. Network sniffer
B. Intrusion detection system
C. Antivirus software
D. Host-based firewall
Which of the following should be used to store a list of strings?
A. Array
B. Constant
C. Variable
D. Branch
Which of the following services is used to translate a URL to an IP address?
A. ARP
B. IMAP
C. DNS
D. MAC
A user has been instructed to use unique passwords for accessing each system. Which of the following BEST describes the potential risk of using the same password?
A. The password might be easier for an attacker to guess.
B. Password compromise would allow access to all of the systems.
C. Single sign-on would be unable to function correctly.
D. Systems might reject the password based on different requirements.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your FC0-U61 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.