A hotel guest is using the public computer to check travel plans. Which of the following is the BEST approach to prevent others from seeing what the guest was doing on the computer?
A. Restart the computer when done.
B. Log off the computer.
C. Use private browsing.
D. Enable pop-up blocker.
Which of the following is an example of encrypted data in transit?
A. Encrypting a drive partition
B. Accessing a banking website
C. Compressing a file with a password
D. Validating a download with a checksum
Which of the following types of software is MOST likely to display a certificate error during normal usage?
A. Web browser
B. Spreadsheet
C. Visual diagramming
D. Accounting
A programmer is designing an expert system that uses a series of closed-ended questions to arrive at specific output. Which of the following characteristics will MOST likely be used in the code for the expert system to achieve this?
A. Branching
B. Looping
C. Arrays
D. Vectors
When editing a document, which of the following describes where the changes are located before they are saved to permanent storage?
A. SSD
B. CPU
C. RAM
D. GPU
Which of the following CIA triad concerns is violated when known-good computer hard drives and printed documents are placed in the trash?
A. Availability
B. Confidentiality
C. Integrity
D. Accounting
Which of the following is typically used to lay out documents with images and text for the web?
A. C++
B. HTML
C. Python
D. JavaScript
A non-profit organization obtains images from the internet to use on a website. Which of the following is the organization possibly infringing on?
A. Copyright
B. Patent
C. Trademark
D. DRM
Which of the following is the number of bits contained in a byte?
A. 4
B. 8
C. 16
D. 1,024
A home user has recently purchased a new desktop computer. After following the prompts during setup and accepting all defaults, the user has noticed outbound network traffic. Which of the following is the MOST likely cause?
A. Pre-installed applications are reporting user information.
B. Applications are retrieving the latest security configuration changes.
C. Group Policy objects are being implemented.
D. The computer is mining cryptocurrency.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your FC0-U61 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.