Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

FC0-U61 Exam Dumps - CompTIA IT Fundamentals+ Certification Exam

Go to page:
Question # 97

Which of the following violates password best practices?

A.

Password reuse across sites

B.

Password history

C.

Password expiration

D.

Password complexity

Full Access
Question # 98

Which of the following wireless communication technologies requires devices to be within 6in (15.24cm) from each other?

A.

NFC

B.

Infrared

C.

Wi-Fi

D.

Bluetooth

Full Access
Question # 99

An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following

is the MOST likely cause?

A.

Script blocker

B.

Proxy settings

C.

Private browsing

D.

Full browser cache

Full Access
Question # 100

A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?

A.

Proxy server

B.

Browser add-on

C.

Corrupted cache

D.

Script blocker

Full Access
Question # 101

Which of the following is something that would likely need a copyright?

A.

A new commercial software program

B.

A company's brand name

C.

A copy of a business contract

D.

An idea for computer communication

Full Access
Question # 102

Which of the following would be the most secure password reset process?

A.

Ask users for their date of birth over the phone and reset their password.

B.

Ask users to answer custom questions and send reset codes via text.

C.

Ask users for their mother’s maiden name and email them a reset link.

D.

Ask users for their phone number and call them back with a PIN.

Full Access
Question # 103

An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?

A.

Hardware failure

B.

Denial of service

C.

On-path attack

D.

Social engineering

Full Access
Go to page: