Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

FC0-U61 Exam Dumps - CompTIA IT Fundamentals+ Certification Exam

Go to page:
Question # 81

Which of the following is an example of a compiled language?

A.

C++

B.

SQL

C.

Python

D.

XML

Full Access
Question # 82

Which of the following is an example of utilizing a personalized code for continuous personal access to a software product?

A.

Site licensing

B.

Open-source licensing

C.

Product key licensing

D.

Single-use licensing

Full Access
Question # 83

A user revisits a website and receives a message that the site may not be secure. The user is prompted to click

a link to continue to the site. Which of the following would MOST likely identify the issue?

A.

Checking the proxy settings

B.

Checking that caching is enabled

C.

Checking browser add-ons

D.

Checking certificate validity

Full Access
Question # 84

After purchasing a flash drive, the buyer notices that the packaging had already been opened. Which of the following is this is an example of?

A.

Confidentiality

B.

Availability

C.

Integrity

D.

Non-repudiation

Full Access
Question # 85

Which of the following license types would be most cost effective for an organization if all users need to access software but not on a consistent basis?

A.

Site

B.

Single-use

C.

Concurrent

D.

Device

Full Access
Question # 86

Which of the following is an example of multifactor authentication?

A.

Password and passphrase

B.

Fingerprint and retina scan

C.

Hardware token and smartphone

D.

Smart card and PIN

Full Access
Question # 87

A technician is troubleshooting an error message and tests the same program on a separate, identical

machine. Which of the following troubleshooting methodology steps is this an example of?

A.

Duplicate the problem

B.

Gather information

C.

QUESTION NO: users

D.

Divide and conquer

Full Access
Question # 88

Which of the following is the best way to prevent malicious code from executing on a laptop based on attack signatures?

A.

Host-based firewall

B.

Antivirus

C.

Patching

D.

Network-based firewall

Full Access
Go to page: